DEV Community

Dwayne McDaniel profile picture

Dwayne McDaniel

Dwayne has been working as a Developer Relations professional since 2015 and has been involved in tech communities since 2005. He loves sharing his knowledge all around the world!

Location Chicago, IL Joined Joined on  Personal website https://dwayne-mcdaniel.com/ twitter website

Work

Developer Evangelist

Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments

Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments

Comments
7 min read
SCaLE 21x: A Community Event About Much More Than Linux

SCaLE 21x: A Community Event About Much More Than Linux

1
Comments
12 min read
Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

7
Comments
4 min read
SnowFROC 2024: Securing The Future With OWASP Community In Denver

SnowFROC 2024: Securing The Future With OWASP Community In Denver

1
Comments
7 min read
Civo Navigate 2024: Scaling Community And Containers In Austin

Civo Navigate 2024: Scaling Community And Containers In Austin

1
Comments
6 min read
Lessons On Secrets Security From Datadog Research

Lessons On Secrets Security From Datadog Research

Comments
8 min read
Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Comments
6 min read
ChiBrrCon IV: Understanding risks and the role of the CISO

ChiBrrCon IV: Understanding risks and the role of the CISO

1
Comments
7 min read
Evaluating Secrets Detection Platforms Is Complex: GitGuardian is here to help you navigate the process

Evaluating Secrets Detection Platforms Is Complex: GitGuardian is here to help you navigate the process

Comments
6 min read
Good Application Security Posture Management Requires Great Data

Good Application Security Posture Management Requires Great Data

Comments
6 min read
Honeytokens For Peace Of Mind: Using Cyber Deception To Buy Time To Remediate At Scale

Honeytokens For Peace Of Mind: Using Cyber Deception To Buy Time To Remediate At Scale

Comments
3 min read
Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Comments
9 min read
Developer Education - GitGuardian Supports Your Learning Style

Developer Education - GitGuardian Supports Your Learning Style

1
Comments
9 min read
TechBash: Automation, Security and Development Best Practices In The Poconos

TechBash: Automation, Security and Development Best Practices In The Poconos

7
Comments
9 min read
Uncovering thousands of unique secrets in PyPI packages

Uncovering thousands of unique secrets in PyPI packages

5
Comments
10 min read
What to do if you expose a secret: How to stay calm and respond to an incident

What to do if you expose a secret: How to stay calm and respond to an incident

Comments
12 min read
API World 2023: Bringing together API, AI, and Secrets security

API World 2023: Bringing together API, AI, and Secrets security

1
Comments
9 min read
Connecting with the community at BSides Atlanta 2023

Connecting with the community at BSides Atlanta 2023

Comments
8 min read
Cybersecurity and AI deep in the heart of Texas Cyber Summit

Cybersecurity and AI deep in the heart of Texas Cyber Summit

1
Comments
11 min read
Secrets management takes more than just tools

Secrets management takes more than just tools

Comments
13 min read
A look at the future of supply chain and national security: Updates from CISA and NIST

A look at the future of supply chain and national security: Updates from CISA and NIST

Comments
11 min read
Compromised Credentials Leading Cause Of Initial Attack Access: Findings from the Sophos 2023 Active Adversary Report

Compromised Credentials Leading Cause Of Initial Attack Access: Findings from the Sophos 2023 Active Adversary Report

Comments
8 min read
dev up 2023: Leveling up our dev skills, security posture, and careers

dev up 2023: Leveling up our dev skills, security posture, and careers

1
Comments
10 min read
Defending your castle: Raising walls versus detecting intruders

Defending your castle: Raising walls versus detecting intruders

Comments
6 min read
Developer Week CloudX 2023 - Better security and accessibility in the cloud

Developer Week CloudX 2023 - Better security and accessibility in the cloud

Comments
11 min read
Hardcoded secret at the heart of the Dell Compellent VMware vulnerability

Hardcoded secret at the heart of the Dell Compellent VMware vulnerability

1
Comments
6 min read
Researcher finds GitHub admin credentials of car company thanks to misconfiguration

Researcher finds GitHub admin credentials of car company thanks to misconfiguration

1
Comments
6 min read
DEF CON 31: A hot time in the Las Vegas heat and some cool days in AppSec Village

DEF CON 31: A hot time in the Las Vegas heat and some cool days in AppSec Village

1
Comments
14 min read
BSidesLV: The big event before the biggest security event in Las Vegas

BSidesLV: The big event before the biggest security event in Las Vegas

Comments
11 min read
Protect Your Keys - Lessons from the Azure Key Breach

Protect Your Keys - Lessons from the Azure Key Breach

Comments
7 min read
How to Secure Your Productivity Tools with GitGuardian Honeytoken

How to Secure Your Productivity Tools with GitGuardian Honeytoken

2
Comments
9 min read
Using GitGuardian Honeytoken [cheat sheet included]

Using GitGuardian Honeytoken [cheat sheet included]

3
Comments
7 min read
Nebraska.Code() - Developing in the great plains

Nebraska.Code() - Developing in the great plains

Comments
9 min read
Secure Code Review Best Practices [cheat sheet included]

Secure Code Review Best Practices [cheat sheet included]

7
Comments
6 min read
How to Secure Your IaC and Configuration Management Tools with GitGuardian’s Honeytoken

How to Secure Your IaC and Configuration Management Tools with GitGuardian’s Honeytoken

1
Comments
8 min read
Code Security: Manual Code Reviews Ain't Enough

Code Security: Manual Code Reviews Ain't Enough

Comments
8 min read
RVAsec 2023: Improving ourselves, our security, and our community

RVAsec 2023: Improving ourselves, our security, and our community

Comments
10 min read
Verizon 2023 DBIR: Credential Leaks Continue To Be A Major Issue

Verizon 2023 DBIR: Credential Leaks Continue To Be A Major Issue

1
Comments
4 min read
php[tek] 2023 - A Community Of Communities Powering The Internet

php[tek] 2023 - A Community Of Communities Powering The Internet

2
Comments
9 min read
cdCon + GitOpsCon - Co-evolving Open Source DevOps Communities In One Conference

cdCon + GitOpsCon - Co-evolving Open Source DevOps Communities In One Conference

1
Comments
8 min read
BSidesAustin 2023: CyberSecurity In The Texas Tech Capital

BSidesAustin 2023: CyberSecurity In The Texas Tech Capital

1
Comments
11 min read
GitGuardian at AppSec Village: Honeytokens for the blue team

GitGuardian at AppSec Village: Honeytokens for the blue team

Comments
7 min read
RSA Conference 2023: DevSecOps and The Future Of Security

RSA Conference 2023: DevSecOps and The Future Of Security

1
Comments
2 min read
BSides San Francisco - A Two-Day Community Celebration

BSides San Francisco - A Two-Day Community Celebration

Comments
1 min read
Cyphercon 6

Cyphercon 6

Comments
6 min read
Remediating Incidents With The GitGuardian API [cheat sheet included]

Remediating Incidents With The GitGuardian API [cheat sheet included]

Comments
11 min read
GitHub Exposed A Private SSH Key: What You Need To Know

GitHub Exposed A Private SSH Key: What You Need To Know

Comments
7 min read
Cybersecurity Learning Across Sectors - How ICCWS Brings Academics, Government, And Private Companies Together

Cybersecurity Learning Across Sectors - How ICCWS Brings Academics, Government, And Private Companies Together

Comments 1
7 min read
Developer Week 2023 - The Enterprise Community Sharing Security Best Practices

Developer Week 2023 - The Enterprise Community Sharing Security Best Practices

Comments
7 min read
Intrusion Detection Through Cyber Deception: Disrupting Attacks With An Active Defense

Intrusion Detection Through Cyber Deception: Disrupting Attacks With An Active Defense

Comments
7 min read
CloudNativeSecurityCon 2023: A Unique Community Event Focused On The Future Of Open Source and Cloud Native Security

CloudNativeSecurityCon 2023: A Unique Community Event Focused On The Future Of Open Source and Cloud Native Security

Comments
14 min read
IAM Best Practices [cheat sheet included]

IAM Best Practices [cheat sheet included]

1
Comments
10 min read
How To Secure Your CI/CD Pipeline

How To Secure Your CI/CD Pipeline

1
Comments
5 min read
BSides SLC: Community, Fun, And Security Best Practices In Salt Lake City

BSides SLC: Community, Fun, And Security Best Practices In Salt Lake City

Comments
7 min read
Honeytokens - Protect Your Holy Grail

Honeytokens - Protect Your Holy Grail

Comments
4 min read
CyberTech NYC 2022: Securing The Future Together

CyberTech NYC 2022: Securing The Future Together

Comments
9 min read
Securing The New Frontier in Developer Environments: Cloud IDEs

Securing The New Frontier in Developer Environments: Cloud IDEs

1
Comments
11 min read
Don't Tackle Security Alone: A Beginner's Guide To OWASP

Don't Tackle Security Alone: A Beginner's Guide To OWASP

13
Comments
12 min read
How To Use ggshield To Avoid Hardcoded Secrets [cheat sheet included]

How To Use ggshield To Avoid Hardcoded Secrets [cheat sheet included]

Comments
9 min read
SecureWV 2022 Lucky Th1rt3en: Malware, ransomware, and maturity models

SecureWV 2022 Lucky Th1rt3en: Malware, ransomware, and maturity models

1
Comments
6 min read
loading...