Skip to main content
false
Shanika Wickramasinghe

Shanika Wickramasinghe is a software engineer by profession and a graduate in Information Technology. Her specialties are Web and Mobile Development. Shanika considers writing the best medium to learn and share her knowledge. She is passionate about everything she does, loves to travel and enjoys nature whenever she takes a break from her busy work schedule. She also writes for her Medium blog sometimes. You can connect with her on LinkedIn.

Learn 7 Min Read

The Compliance-as-a-Service (CaaS) Ultimate Guide

Compliance — but make it subscription-based! Yes, the as-a-service model comes for compliance. Let’s see the good, the concerns and how this works.
Learn 7 Min Read

Behavioral Analytics in Cybersecurity

Analyzing behaviors has a lot of use cases. In this article, we are hyper-focused on using BA for the cybersecurity of your enterprise. Learn all about BA here.
Learn 7 Min Read

Cyber Counterintelligence (CCI): Offensive & Defensive Strategies for Cybersecurity

How do you gather intelligence about the bad actors trying to infiltrate your systems? Cyber counterintelligence offers defensive and offensive approaches.
Learn 6 Min Read

Canonical Data Models (CDMs) Explained

Take control of your organization's data mess. Canonical data models will reduce the work you do to your data. Find out exactly how to get started.
Learn 1 Min Read

Attack Surface Management (ASM) Explained

Attack surfaces can change practically daily. Attack surface management is a must-have cybersecurity strategy to identify — and promptly eliminate — vulnerabilities.
Learn 7 Min Read

Threat Hunting vs. Threat Detecting: What's The Difference?

Hunting threats, detecting threats. Sounds the same — but they are not! Get tons of info (+ free resources) for prevention methods that underpin cybersecurity.
Learn 6 Min Read

Cryptography 101: Key Principles, Major Types, Use Cases & Algorithms

Cryptography underpins so many digital interactions — you might not even realize it. Get the full story on cryptography, use cases and emerging types.
Learn 8 Min Read

Most Common Types of Ransomware Today

Don’t be held hostage by cyberattackers. Ransomware is here to stay. Prepare by knowing exactly how they work (there’s different types) and how to prevent them
Learn 7 Min Read

The DevOps Automation Guide

Automation is essential to DevOps — but it’s not easy. This guide details how to automate DevOps and the best tools for the job so you can succeed in no time!
Learn 6 Min Read

Extract, Transform & Load (ETL) Explained

Strengthen your data foundation by knowing ETL. Short for Extract, Transform, Load, the ETL process is vital for turning all that data into business value.
Learn 7 Min Read

Cross-Site Scripting (XSS) Attacks & How To Prevent Them

Understand how XSS attacks work and turn internet readers into victims. Learn the techniques, types, impact and — importantly — how to prevent them.
Learn 7 Min Read

Brute Force Attacks: Techniques, Types & Prevention

Yes, brute force attacks remain a major threat in 2023. Get the latest on brute force attacks: types, trends, business impacts & how to prevent them.
Learn 7 Min Read

What is CVE? Common Vulnerabilities and Exposures

Get the 101 on the CVE. The Common Vulnerabilities and Exposures (CVE) is a dictionary of publicly known cybersecurity vulnerabilities and exposures.
Learn 7 Min Read

What is AppSec? Application Security Explained

Get the latest in application security! Understand its significance, common AppSec vulnerabilities and — best of all — actionable ways to support AppSec.
Learn 7 Min Read

What is Cloud-Native Security? An Introduction

Understand how cloud native security can protect your organization's data and applications in the cloud. Explore the 4Cs and 3Rs principles plus get common strategies.
Learn 7 Min Read

Cyber Threat Intelligence (CTI): A Beginner's Guide

Get a full introduction to Cyber Threat Intelligence. CTI is the best way for organizations to mitigate the risks of new cyber threats in the future.