Skip to main content
false

Shanika Wickramasinghe

Shanika Wickramasinghe is a software engineer by profession and a graduate in Information Technology. Her specialties are Web and Mobile Development. Shanika considers writing the best medium to learn and share her knowledge. She is passionate about everything she does, loves to travel and enjoys nature whenever she takes a break from her busy work schedule. She also writes for her Medium blog sometimes. You can connect with her on LinkedIn.

Learn 4 Min Read

What Is FIDO2?

Get all the details on FIDO2, the latest authentication technology that many organizations around the world are adopting.
Learn 6 Min Read

What is Continuous Monitoring?

Learn about continuous monitoring, the ongoing detection of risks and problems within IT environments, including how it works and how to start implementing it.
Learn 7 Min Read

Availability Zones: The Complete Guide for 2025

If you use cloud services, you’ll want to be familiar with availability zones, as these play a major part in your overall cloud performance. Get the full story here.
Learn 5 Min Read

Data Analysis Skills You Need To Know

Data analysis is the skill to have today. But exactly what do you need to ace to be a great data analyst? We’ve got you covered in this article.
Learn 3 Min Read

Monitoring IaaS (Infrastructure as a Service)

Monitoring cloud services isn't easy, especially when it comes to IaaS. Read on to understand the importance of IaaS monitoring and what problems it can help you solve.
Learn 6 Min Read

CAP Theorem & Strategies for Distributed Systems

Often misunderstood, the CAP Theorem is important to get right. Learn what the CAP theorem really is about, so your distributed systems stay resilient.
Learn 4 Min Read

What are SaaS, PaaS, & IaaS?

Yes, the cloud makes work better. But which cloud model is right for you? Understand how SaaS, PaaS, and IaaS works in this ultimate guide.
Learn 8 Min Read

Agile Transformation

Agile transformation shifts your organization towards a model that is customer-centric, efficient, innovative, and focused on productive product delivery.
Learn 7 Min Read

APM Metrics: The Ultimate Guide

Go beyond traditional APM and extend your monitoring strategy to include metrics that are important in cloud-native, DevOps-oriented environments.
Learn 8 Min Read

AI Risk Management in 2025: What You Need To Know

Risk management applies to AI, too! Get the full story on AI Risk Management, including the risks to know, a risk approach, and an in-depth look at NIST’s AI RMF.
Learn 7 Min Read

What is Penetration Testing (Pen Testing)?

Learn about penetration testing — simulating attacks to find security weaknesses. Plus: the six pentesting stages, sample tools and hands-on examples.
Learn 7 Min Read

Defining & Improving Your Security Posture

What is your security posture? The result of all your security strategies, processes and practices. Get the total low-down on evaluating & improving yours.
Learn 7 Min Read

Continuous Threat Exposure Management (CTEM)

Attack surfaces changing daily? Cyber threats on the rise? Old ways of working ain't cutting it? CTEM may be your cyber solution. Get the full story here.
Learn 7 Min Read

Software Liability Explained

Software liability is the legal responsibility of software development companies on issues related to the software they develop. Get all the details here.
Learn 7 Min Read

Observability Engineering: A Beginner's Guide

Dive into Observability Engineering with this beginner's guide, exploring its fundamentals, tools, and impact on system performance.
Learn 7 Min Read

What is the Augmented Connected Workforce?

This article provides an overview of the Augmented Connected Workforce, detailing the use cases of AR and other key technologies, along with the key benefits and challenges associated with this concept.
Learn 6 Min Read

Risk Tolerance vs. Risk Appetite Explained

Risk Tolerance and Risk Appetite are two fundamental concepts for businesses to define today. Get the full story on these concepts here.
Learn 6 Min Read

Active vs. Passive Monitoring: What’s The Difference?

Active and passive monitoring: which one is for you? Let’s look at the two methods, along with their use cases, data volumes, and control over the data.