Shanika Wickramasinghe's Blog Posts

Shanika Wickramasinghe is a software engineer by profession and a graduate in Information Technology. Her specialties are Web and Mobile Development. Shanika considers writing the best medium to learn and share her knowledge. She is passionate about everything she does, loves to travel and enjoys nature whenever she takes a break from her busy work schedule. She also writes for her Medium blog sometimes. You can connect with her on LinkedIn.

What Is Attack Surface Management? A Complete Guide To ASM
Learn
5 Minute Read

What Is Attack Surface Management? A Complete Guide To ASM

Understand Attack Surface Management (ASM), explore its 4-step lifecycle, real-world examples, best tools, and how it strengthens your security strategy.
The Guide to Network Forensics: Importance, Tools, and Use Cases
Learn
9 Minute Read

The Guide to Network Forensics: Importance, Tools, and Use Cases

Learn how network forensics helps investigate cyberattacks, detect real-time threats, and protect systems with tools, techniques, and real-world use cases.
Software Supply Chain Security: Proven Frameworks & Tactics to Stay Ahead of Threats
Learn
9 Minute Read

Software Supply Chain Security: Proven Frameworks & Tactics to Stay Ahead of Threats

Learn how to secure your software supply chain with real-world examples, key risks, and actionable strategies to protect your code, tools, and dependencies.
QoS Explained: Quality of Service in Networks
Learn
8 Minute Read

QoS Explained: Quality of Service in Networks

Learn how QoS (Quality of Service) ensures reliable network performance by prioritizing critical traffic, reducing latency, and managing congestion.
The Role of SCA in Software Security: The Software Composition Analysis Complete Guide
Learn
10 Minute Read

The Role of SCA in Software Security: The Software Composition Analysis Complete Guide

Learn all about SCA. Software composition analysis is a type of security testing that identifies the open-source and third-party components used in modern software.
Active vs. Passive Monitoring: What’s The Difference?
Learn
6 Minute Read

Active vs. Passive Monitoring: What’s The Difference?

Active and passive monitoring: which one is for you? Let’s look at the two methods, along with their use cases, data volumes, and control over the data.