Zero Trust Architecture: Redefining Cybersecurity in the Modern AgeIn an era where cyber threats are more sophisticated and pervasive than ever, traditional security models are proving inadequate. The…Jun 13, 20241Jun 13, 20241
Cybersecurity vs Artificial Intelligence: A Comparative StudyIn the ever-evolving landscape of technology, two domains have emerged as pivotal players: Cybersecurity and Artificial Intelligence. While…Dec 5, 20238Dec 5, 20238
Safeguarding Cyberspace: Harnessing the Power of Generative AI in CybersecurityAs I explore the profound impact of generative AI on cybersecurity, I’m amazed by the transformative potential it holds.Jul 7, 2023Jul 7, 2023
Cyber Crimes and Cyber Laws in Sri Lanka: Safeguarding Digital SpacesIn today’s digital age, where technology is integrated into almost every aspect of our lives, the threat of cyber-crime looms large. Sri…May 28, 202318May 28, 202318
Cybersecurity Best Practices: How to Protect Yourself OnlineIn today’s digital age, it’s more important than ever to be aware of cybersecurity best practices. With the ever-increasing number of…Apr 8, 2023Apr 8, 2023
How Cybersecurity Books Can Help Professionals Enhance Their Skills and ExpertiseCybersecurity has become one of the most crucial aspects of our lives in today’s digital age. From securing our personal information to…Feb 21, 20233Feb 21, 20233
Films and TV Shows About Cybersecurity That You Should WatchCyber security, cyber attacks, and the criminals who commit those actions have been subjects of fascination in Hollywood for about half a…Nov 25, 20221Nov 25, 20221
Introduction to Digital ForensicsIf someone ask what is digital forensics from me, I can says It’sJan 4, 2021131Jan 4, 2021131
Social Media Security Best PracticesBest security practices when we’re using social media sitesJun 26, 202011Jun 26, 202011
Top Free Security Information and Event Management(SIEM) Software'sSecurity information and event management (SIEM) software give enterprise security professionals both insight into and a track record of…Apr 12, 202020Apr 12, 202020
History of the Neural Networks — Part 3Third part of history of neural network seriesJan 28, 2020Jan 28, 2020
History of the Neural Networks — Part 2Second part of the history of neural network seriesDec 25, 2019Dec 25, 2019
History of the Neural Networks — Part 1In its most general form, a neural network is a machine that is designed to model the way in which the brain performs a particular task or…Oct 30, 2019Oct 30, 2019
Published inCrypto Currency HubBasic Introduction to Blockchain Technology.Presently blockchains technology is revolutionize healthcare industry , businesses , government and our personal life.Sep 30, 2019Sep 30, 2019
Active and Passive Information Gathering TechniquesActive Information GatheringSep 22, 2019Sep 22, 2019
Active and Passive Information Gathering TechniquesPassive Information GatheringSep 20, 20191Sep 20, 20191
Active and Passive Information Gathering Techniques- IntroductionDoing a penetration test is about breaking into the system and taking its ownership . To break into a system, we need to identify its…Sep 19, 20191Sep 19, 20191