Skip to main content
false
Shanika Wickramasinghe

Shanika Wickramasinghe is a software engineer by profession and a graduate in Information Technology. Her specialties are Web and Mobile Development. Shanika considers writing the best medium to learn and share her knowledge. She is passionate about everything she does, loves to travel and enjoys nature whenever she takes a break from her busy work schedule. She also writes for her Medium blog sometimes. You can connect with her on LinkedIn.

Learn 7 Min Read

Browser-Based IDEs: The Complete Guide

Unlock the power of browser-based IDEs: the future of coding, offering convenience, collaboration, and scalability for developers worldwide.
Learn 6 Min Read

Authentication vs. Authorization

Discover the fundamental differences between authentication and authorization, explore techniques, and best practices to implement robust security measures.
Learn 7 Min Read

Application Vulnerability Management: The Complete Guide

Applications are never "set and forget". Leveraging best practices in security and automation can make vulnerability management easy, read more to learn how.
Learn 7 Min Read

Prometheus: Key Features, Components & Use Cases of the Open Source Monitoring Tool

Learn about Prometheus, the open source monitoring and alerting tool. Discover features, use cases, limitations, and suitability for your organization.
Learn 7 Min Read

SQL vs. NoSQL Today: Databases, Differences & When To Use Which

Trying to decide on the right database type? SQL and NoSQL each have their own pros and cons, from relational to schema-less, to vertical and horizontal scaling.
Learn 1 Min Read

SOC Metrics: Security Metrics & KPIs for Measuring SOC Success

Maintaining a keen eye on SOC success is critical in any security operation. Join us as we discuss common KPIs, and how to leverage metrics for improvement.
Learn 6 Min Read

Cloud Cryptomining: How It Works & How To Minimize Risk

Are the days of setting up expensive cryptomining rigs over? Learn how cloud cryptomining brings cost reduction, scalability and efficiency to cryptocurrency mining.
Learn 6 Min Read

RSA Algorithm in Cryptography: Rivest Shamir Adleman Explained

RSA encryption allows us to transmit sensitive data online. Here we discuss how RSA works, its use cases, and what security vulnerabilities it presents.
Learn 7 Min Read

Programming Languages: Today's Ultimate Guide

Looking to become a developer, but not sure where to start? We've put together the definitive guide to learning programming in 2023
Learn 6 Min Read

SAML & SAML Authentication, Explained

SSO makes authentication and authorization a breeze — SAML makes it possible. Read our crash course to learn how!
Learn 6 Min Read

Password Spraying Today: Everything To Know To Prevent Password Spraying Attacks

Password spraying remains a threat today, despite improvements in password safety and privacy. Read all about this attack tactic in order to prevent it.
Learn 7 Min Read

SRE vs. DevOps vs. Platform Engineering: What’s The Difference?

DevOps, SRE, platform engineering: they all have something to do with system reliability and software development — but what is the difference? We’ll clarify here!
Learn 7 Min Read

The Digital Resilience Guide: 7 Steps To Building Digital Resilience

When faced with major changes and cyberattacks, digital resilience ensures our systems can bounce back. See more, react fast. With digital resilience.
Learn 6 Min Read

Data Streaming: A Complete Introduction

Ever think about how you receive messages so quickly? 🌊 That’s all thanks to Data Streaming, the backbone of so many technologies we rely on daily.
Learn 6 Min Read

Data Centers: The Ultimate Guide To Data Center Cooling & Energy Optimization

Because data contribute heavily to carbon emissions (thus overall climate change), they are the perfect place to optimize and reduce energy usage.
Learn 6 Min Read

What Is Data Resilience?

You’ve got data, plenty of it. The question is whether you’re maximizing it. If your data isn’t serving your customers, then you need to build data resilience.
Learn 6 Min Read

Data Denormalization: The Complete Guide

To normalize or not normalize your data. Decide here, as we explain why you’d denormalize data (faster query times!) but also the reasons to avoid it.
Learn 6 Min Read

Data Lakehouses: Everything You Need To Know

An emerging data architecture, data lakehouses sure sound nicer than both data warehouses and data lakes — that’s because data lakehouses are nicer to use.