Skip to main content
false

Shanika Wickramasinghe

Shanika Wickramasinghe is a software engineer by profession and a graduate in Information Technology. Her specialties are Web and Mobile Development. Shanika considers writing the best medium to learn and share her knowledge. She is passionate about everything she does, loves to travel and enjoys nature whenever she takes a break from her busy work schedule. She also writes for her Medium blog sometimes. You can connect with her on LinkedIn.

Learn 7 Min Read

RSA Algorithm in Cryptography: Rivest Shamir Adleman Explained

This article describes RSA algorithm, how it works, and its major applications in cryptography. It also explains the vulnerabilities of RSA.
Learn 8 Min Read

What is Network Segmentation? A Complete Guide

Learn how network segmentation enhances security, boosts network performance, and protects critical assets by isolating subnets and limiting cyber threats.
Learn 12 Min Read

AppSec Today: Application Security Requirements & Guidelines To Know

Explore the essential aspects of application security: threats, requirements, and best practices. Learn how to safeguard your applications and data effectively.
Learn 6 Min Read

What are Attack Surfaces?

Discover how attack surfaces impact cybersecurity, the risks they pose, and effective strategies for minimizing vulnerabilities in your organization.
Learn 7 Min Read

What are CASBs? Cloud Access Security Brokers Explained

Discover the role of Cloud Access Security Brokers (CASBs) in securing cloud environments, ensuring data protection, and maintaining compliance for businesses.
Learn 6 Min Read

What Is Authorization?

Authorization is the process of deciding what actions, parts of a website, or application a given user can access after they have been authenticated.
Learn 8 Min Read

SRE vs. DevOps vs. Platform Engineering: Differences Explained

This article explains SRE vs DevOps vs Platform Engineering, including similarities and differences, and more.
Learn 7 Min Read

Access Points: A Complete Introduction

All those wireless devices we rely on daily connect thanks to access points, instead of cables and wires. Learn more here.
Learn 6 Min Read

The Caesar Cipher, Explained

The Caesar Cipher is among the oldest encryption techniques used to communicate securely. It’s simple to use and easy to break, as you’ll see here.
Learn 6 Min Read

Cross-Site Scripting (XSS) & How to Prevent Attacks

Learn about Cross Site Scripting (XSS) attacks and how they work. Check out its examples, types, impacts, and ways to prevent it.
Learn 10 Min Read

Common Ransomware Attack Types

Learn about ransomware and its various attack types. Take a look at ransomware examples and statistics and learn how you can stop attacks.
Learn 8 Min Read

What Is OpenTracing?

Though the OpenTracing project is no longer supported, learn how it worked & how to migrate to the newer OpenTelemetry framework.
Learn 10 Min Read

The CVE & CVE Management, Explained

The CVE is a go-to public list of vulnerabilities and exposures that threat actors can harness. Get the full story for managing CVEs here.
Learn 7 Min Read

Chaos Testing Explained

A part of SRE, chaos testing is a software testing approach where we intentionally break things in an app in order to test and strengthen its resilience.
Learn 6 Min Read

What’s ARP? Address Resolution Protocol Explained

The Address Resolution Protocol (ARP) is a fundamental network communication protocol used within LANs. Get the full story here.
Learn 9 Min Read

What Is Vulnerability Management?

Read about how a strong vulnerability management program gives companies the capacity to easily detect vulnerabilities early before they become real threats.
Learn 7 Min Read

What is Cyber Threat Intelligence?

Get a full introduction to Cyber Threat Intelligence. CTI is the best way for organizations to mitigate the risks of new cyber threats in the future.
Learn 7 Min Read

What is Attack Surface Management?

Attack surfaces can change practically daily. Attack surface management is a must-have cybersecurity strategy to identify — and promptly eliminate — vulnerabilities.