Skip to main content
false

Shanika Wickramasinghe

Shanika Wickramasinghe is a software engineer by profession and a graduate in Information Technology. Her specialties are Web and Mobile Development. Shanika considers writing the best medium to learn and share her knowledge. She is passionate about everything she does, loves to travel and enjoys nature whenever she takes a break from her busy work schedule. She also writes for her Medium blog sometimes. You can connect with her on LinkedIn.

Learn 7 Min Read

Behavioral Analytics in Cybersecurity

Analyzing behaviors has a lot of use cases. In this article, we are hyper-focused on using BA for the cybersecurity of your enterprise. Learn all about BA here.
Learn 7 Min Read

Cyber Counterintelligence (CCI): Offensive & Defensive Strategies for Cybersecurity

How do you gather intelligence about the bad actors trying to infiltrate your systems? Cyber counterintelligence offers defensive and offensive approaches.
Learn 6 Min Read

Canonical Data Models (CDMs) Explained

Take control of your organization's data mess. Canonical data models will reduce the work you do to your data. Find out exactly how to get started.
Learn 7 Min Read

Threat Hunting vs. Threat Detecting: What's The Difference?

Hunting threats, detecting threats. Sounds the same — but they are not! Get tons of info (+ free resources) for prevention methods that underpin cybersecurity.
Learn 6 Min Read

Cryptography 101: Key Principles, Major Types, Use Cases & Algorithms

Cryptography underpins so many digital interactions — you might not even realize it. Get the full story on cryptography, use cases and emerging types.
Learn 7 Min Read

What is DevOps Automation?

Automation is essential to DevOps — but it’s not easy. This guide details how to automate DevOps and the best tools for the job so you can succeed in no time!
Learn 6 Min Read

What is ETL?

Strengthen your data foundation by knowing ETL. Short for Extract, Transform, Load, the ETL process is vital for turning all that data into business value.
Learn 7 Min Read

What is Cloud-Native Security? An Introduction

Understand how cloud native security can protect your organization's data and applications in the cloud. Explore the 4Cs and 3Rs principles plus get common strategies.