false

Shanika Wickramasinghe

Shanika Wickramasinghe is a software engineer by profession and a graduate in Information Technology. Her specialties are Web and Mobile Development. Shanika considers writing the best medium to learn and share her knowledge. She is passionate about everything she does, loves to travel and enjoys nature whenever she takes a break from her busy work schedule. She also writes for her Medium blog sometimes. You can connect with her on LinkedIn.

Learn 7 Min Read

SQL vs. NoSQL Today: Databases, Differences & When To Use Which

Trying to decide on the right database type? SQL and NoSQL each have their own pros and cons, from relational to schema-less, to vertical and horizontal scaling.
Learn 8 Min Read

SOC Metrics: Security Metrics & KPIs for Measuring SOC Success

Maintaining a keen eye on SOC success is critical in any security operation. Join us as we discuss common KPIs, and how to leverage metrics for improvement.
Learn 6 Min Read

Cloud Cryptomining: How It Works & How To Minimize Risk

Are the days of setting up expensive cryptomining rigs over? Learn how cloud cryptomining brings cost reduction, scalability and efficiency to cryptocurrency mining.
Learn 7 Min Read

Programming Languages: Today's Ultimate Guide

Looking to become a developer, but not sure where to start? We've put together the definitive guide to learning programming in 2023
Learn 6 Min Read

SAML & SAML Authentication, Explained

SSO makes authentication and authorization a breeze — SAML makes it possible. Read our crash course to learn how!
Learn 6 Min Read

Password Spraying Attacks: What You Need To Know To Prevent Attacks

Password spraying remains a threat today, despite improvements in password safety and privacy. Read all about this attack tactic in order to prevent it.
Learn 7 Min Read

The Digital Resilience Guide: 7 Steps To Building Digital Resilience

When faced with major changes and cyberattacks, digital resilience ensures our systems can bounce back. See more, react fast. With digital resilience.
Learn 6 Min Read

Data Streaming: A Complete Introduction

Ever think about how you receive messages so quickly? 🌊 That’s all thanks to Data Streaming, the backbone of so many technologies we rely on daily.
Learn 6 Min Read

Data Centers: The Ultimate Guide To Data Center Cooling & Energy Optimization

Because data contribute heavily to carbon emissions (thus overall climate change), they are the perfect place to optimize and reduce energy usage.
Learn 6 Min Read

What Is Data Resilience?

You’ve got data, plenty of it. The question is whether you’re maximizing it. If your data isn’t serving your customers, then you need to build data resilience.
Learn 6 Min Read

Data Denormalization: The Complete Guide

To normalize or not normalize your data. Decide here, as we explain why you’d denormalize data (faster query times!) but also the reasons to avoid it.
Learn 6 Min Read

Data Lakehouses: Everything You Need To Know

An emerging data architecture, data lakehouses sure sound nicer than both data warehouses and data lakes — that’s because data lakehouses are nicer to use.
Learn 7 Min Read

The Compliance-as-a-Service (CaaS) Ultimate Guide

Compliance — but make it subscription-based! Yes, the as-a-service model comes for compliance. Let’s see the good, the concerns and how this works.
Learn 7 Min Read

Behavioral Analytics in Cybersecurity

Analyzing behaviors has a lot of use cases. In this article, we are hyper-focused on using BA for the cybersecurity of your enterprise. Learn all about BA here.
Learn 7 Min Read

Cyber Counterintelligence (CCI): Offensive & Defensive Strategies for Cybersecurity

How do you gather intelligence about the bad actors trying to infiltrate your systems? Cyber counterintelligence offers defensive and offensive approaches.
Learn 6 Min Read

Canonical Data Models (CDMs) Explained

Take control of your organization's data mess. Canonical data models will reduce the work you do to your data. Find out exactly how to get started.
Learn 7 Min Read

Threat Hunting vs. Threat Detecting: What's The Difference?

Hunting threats, detecting threats. Sounds the same — but they are not! Get tons of info (+ free resources) for prevention methods that underpin cybersecurity.
Learn 6 Min Read

Cryptography 101: Key Principles, Major Types, Use Cases & Algorithms

Cryptography underpins so many digital interactions — you might not even realize it. Get the full story on cryptography, use cases and emerging types.