Madushan pereraWhy Non-U.S. Stakeholders Should Prioritize Understanding the NIST RMFThe National Institute of Standards and Technology's (NIST) Risk Management Framework (RMF) is a set of guidelines and processes designed…Jan 9Jan 9
Madushan pereraTryHackMe: Relevant — WalkthroughI hope this walkthrough will be useful to you as you navigate through the Mayor’s Relevant box, which is accessible on TryHackMe. This…Dec 18, 20231Dec 18, 20231
Madushan pereraHTTP Headers: Extra pieces of InformationWhat are HTTP headers?Mar 13, 2023Mar 13, 2023
Madushan pereraHTTP Cookies: How Websites Track Our online ActivitiesHave you ever noticed that after visiting a website, you keep seeing advertisements or suggestions for content linked to that website? Or…Feb 23, 2023Feb 23, 2023
Madushan pereraDiving into the HTTPUnderstanding the Fundamentals and Benefits of the Hypertext Transfer Protocol and how it worksFeb 14, 20231Feb 14, 20231
Madushan pereraPickle Rick Room Walkthrough on TryHackMeA Rick and Morty CTF. Help turn Rick back into a human!Feb 10, 2023Feb 10, 2023
Madushan pereraAI for ensuring Cyber securityCybersecurity is becoming increasingly important as more businesses move online and rely on digital technologies. With the increasing…Feb 10, 2023Feb 10, 2023
Madushan pereraThe Rise of Ransomware Attacks: Protecting Yourself and Your BusinessCybersecurity is a constantly evolving field, and one of the latest threats that have been on the rise in ransomware attacks. Ransomware is…Feb 9, 2023Feb 9, 2023
Madushan pereraUncovering Vulnerabilities: A Guide to Penetration TestingPenetration testing, also known as pen testing, is a security assessment method used to evaluate the vulnerabilities and weaknesses in a…Feb 3, 2023Feb 3, 2023
Madushan pereraCommon blind spots when implementing Zero TrustThe mindset is focused on: “Never trust, always verify”Jan 30, 2023Jan 30, 2023