DEV Community

Seth Keddy profile picture

Seth Keddy

I specialize in deploying and documenting software applications across enterprise retail environments. Passionate about scripting, PowerShell, and scalable solutions that improve operations.

Location Springdale AR Joined Joined on  github website

Education

Western Governors University

Why Every Developer Should Try Self-Hosting

Why Every Developer Should Try Self-Hosting

1
Comments
3 min read

Want to connect with Seth Keddy?

Create an account to connect with Seth Keddy. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Your Company Has Already Been Breached—You Just Don’t Know It Yet

Your Company Has Already Been Breached—You Just Don’t Know It Yet

1
Comments
4 min read
From SOC 2 to SRE: Operationalizing Compliance in High-Speed DevOps Environments

From SOC 2 to SRE: Operationalizing Compliance in High-Speed DevOps Environments

Comments 2
4 min read
Why Your Dockerfile is a Cybersecurity Risk: Supply Chain Threats in Dev Containers

Why Your Dockerfile is a Cybersecurity Risk: Supply Chain Threats in Dev Containers

Comments
3 min read
SBOMs in Production: Lessons from the SolarWinds & xz Attacks

SBOMs in Production: Lessons from the SolarWinds & xz Attacks

Comments
4 min read
Zero Trust for DevOps: How to Architect It Without Destroying Your CI/CD

Zero Trust for DevOps: How to Architect It Without Destroying Your CI/CD

Comments 2
4 min read
Secrets Are Still Killing Pipelines: The Rise of Secretless DevOps

Secrets Are Still Killing Pipelines: The Rise of Secretless DevOps

Comments 1
6 min read
Cybersecurity for Side Hustlers: Protecting Your Etsy Store, Portfolio, and Clients

Cybersecurity for Side Hustlers: Protecting Your Etsy Store, Portfolio, and Clients

Comments
4 min read
Why Everyone Should Be Using a Password Manager in 2025 — No Excuses

Why Everyone Should Be Using a Password Manager in 2025 — No Excuses

Comments 1
4 min read
AI Scams Are Getting Personal: How to Recognize Them Before They Fool You

AI Scams Are Getting Personal: How to Recognize Them Before They Fool You

Comments 1
5 min read
5 Ways Cybersecurity Can Make or Break Your Career in 2025

5 Ways Cybersecurity Can Make or Break Your Career in 2025

Comments 1
4 min read
Your Phone Is Your Badge: How Everyday Apps Are Putting Your Work Identity at Risk

Your Phone Is Your Badge: How Everyday Apps Are Putting Your Work Identity at Risk

Comments 1
7 min read
Personal Lessons on Keeping Legal Data Safe When Installing Clio, MyCase, and LexisNexis — Especially On-Premises

Personal Lessons on Keeping Legal Data Safe When Installing Clio, MyCase, and LexisNexis — Especially On-Premises

Comments
3 min read
Integrating Anti-Malware into CI/CD Pipelines for Proactive Threat Detection

Integrating Anti-Malware into CI/CD Pipelines for Proactive Threat Detection

3
Comments
3 min read
What is Free Anti-Malware, Should I Run It — and Who the Hell Can I Actually Trust?

What is Free Anti-Malware, Should I Run It — and Who the Hell Can I Actually Trust?

Comments
4 min read
MFA Fatigue Attacks and Session Hijacking: How Threat Actors Bypass Modern Defenses

MFA Fatigue Attacks and Session Hijacking: How Threat Actors Bypass Modern Defenses

6
Comments 2
4 min read
Why You Need Multi-Factor Authentication (MFA) on Every Account—Right Now

Why You Need Multi-Factor Authentication (MFA) on Every Account—Right Now

Comments
4 min read
Bypassing Windows Defender in 2025: What DevSecOps Must Understand About Home vs. Enterprise

Bypassing Windows Defender in 2025: What DevSecOps Must Understand About Home vs. Enterprise

Comments
4 min read
Is Microsoft Defender Enough in 2025?

Is Microsoft Defender Enough in 2025?

Comments
4 min read
Social Engineering 2.0: Recon Techniques Scammers Use on LinkedIn Targets

Social Engineering 2.0: Recon Techniques Scammers Use on LinkedIn Targets

Comments
4 min read
How to Spot Fake Recruiters and Job Offers on LinkedIn in 2025

How to Spot Fake Recruiters and Job Offers on LinkedIn in 2025

Comments
3 min read
Star My Repo and I'll Star Yours ⭐️ — Let's Support Each Other!

Star My Repo and I'll Star Yours ⭐️ — Let's Support Each Other!

Comments
2 min read
Step-by-Step Guide to Set Up a Cron Job to Run a Report

Step-by-Step Guide to Set Up a Cron Job to Run a Report

Comments
4 min read
Creating Reports to Find Missing Data During the Normalization Process in SQL

Creating Reports to Find Missing Data During the Normalization Process in SQL

Comments
3 min read
Detailed Logic for RDF Conversion and Use in RDH (Robust Data Hub)

Detailed Logic for RDF Conversion and Use in RDH (Robust Data Hub)

Comments
6 min read
From Input to Impact: How Our RDH Turns Raw Data into Real-Time Signals

From Input to Impact: How Our RDH Turns Raw Data into Real-Time Signals

Comments
7 min read
From Input to Impact: How Our RDH Turns Raw Data into Real-Time Signals

From Input to Impact: How Our RDH Turns Raw Data into Real-Time Signals

Comments
7 min read
Building a Robust Data Hub: Understanding the Data Types That Power It

Building a Robust Data Hub: Understanding the Data Types That Power It

Comments
7 min read
Open-Source AI Agent Frameworks

Open-Source AI Agent Frameworks

Comments
2 min read
Set Up Java Dev Environment on EC2 (Ubuntu): Free Tier

Set Up Java Dev Environment on EC2 (Ubuntu): Free Tier

Comments
2 min read
Automated API Testing with Python: A Pragmatic Guide for Real-World Applications

Automated API Testing with Python: A Pragmatic Guide for Real-World Applications

Comments
2 min read
Deep Dive: Mastering Register-ObjectEvent in PowerShell — Real-Time Event Handling Like a Pro

Deep Dive: Mastering Register-ObjectEvent in PowerShell — Real-Time Event Handling Like a Pro

Comments
2 min read
loading...