Seth Keddy

Seth Keddy @kedster

About: I specialize in deploying and documenting software applications across enterprise retail environments. Passionate about scripting, PowerShell, and scalable solutions that improve operations.

Location:
Springdale AR
Joined:
May 2, 2025

Seth Keddy
articles - 32 total

Why Every Developer Should Try Self-Hosting

"If you can build it, you can host it." Self-hosting has quietly become a power move for developers...

Learn More 1 0Jun 20

Your Company Has Already Been Breached—You Just Don’t Know It Yet

There was a time I walked into a small law office—not much more than twenty users, all Outlook and...

Learn More 1 0Jun 18

From SOC 2 to SRE: Operationalizing Compliance in High-Speed DevOps Environments

Modern DevOps teams thrive on speed. Continuous integration, delivery, and deployment pipelines allow...

Learn More 0 2Jun 4

Why Your Dockerfile is a Cybersecurity Risk: Supply Chain Threats in Dev Containers

Dockerfiles are the backbone of modern DevOps workflows. They define how we build, package, and...

Learn More 0 0Jun 4

SBOMs in Production: Lessons from the SolarWinds & xz Attacks

The last few years have made one thing clear: modern software supply chains are broken. High-profile...

Learn More 0 0Jun 4

Zero Trust for DevOps: How to Architect It Without Destroying Your CI/CD

Zero Trust is one of the most misunderstood and overused terms in modern cybersecurity. In theory,...

Learn More 0 2Jun 4

Secrets Are Still Killing Pipelines: The Rise of Secretless DevOps

Despite advances in DevOps practices and automation, one stubborn problem continues to undermine...

Learn More 0 1Jun 4

Cybersecurity for Side Hustlers: Protecting Your Etsy Store, Portfolio, and Clients

In today’s gig economy, millions of people are turning their hobbies and skills into side businesses....

Learn More 0 0Jun 4

Why Everyone Should Be Using a Password Manager in 2025 — No Excuses

In 2025, using a password manager is not optional. It is not just a nice-to-have or a tool for IT...

Learn More 0 1Jun 4

AI Scams Are Getting Personal: How to Recognize Them Before They Fool You

Artificial intelligence is transforming everything, including cybercrime. Over the past year,...

Learn More 0 1Jun 4

5 Ways Cybersecurity Can Make or Break Your Career in 2025

Cybersecurity used to be a back-office problem. In 2025, it is a personal career risk. Whether you...

Learn More 0 1Jun 4

Your Phone Is Your Badge: How Everyday Apps Are Putting Your Work Identity at Risk

Your Phone Is Your Badge: How Everyday Apps Are Putting Your Work Identity at Risk When we...

Learn More 0 1Jun 4

Personal Lessons on Keeping Legal Data Safe When Installing Clio, MyCase, and LexisNexis — Especially On-Premises

Digital Tools Every Modern Lawyer Should Know Real-World Insights from Installing...

Learn More 0 0Jun 1

Integrating Anti-Malware into CI/CD Pipelines for Proactive Threat Detection

Integrating Anti-Malware into CI/CD Pipelines for Proactive Threat Detection ...

Learn More 3 0Jun 1

What is Free Anti-Malware, Should I Run It — and Who the Hell Can I Actually Trust?

What is Free Anti-Malware, Should I Run It, and Who the Hell Can I Actually Trust? Peek...

Learn More 0 0Jun 1

MFA Fatigue Attacks and Session Hijacking: How Threat Actors Bypass Modern Defenses

Multi-factor authentication (MFA) is no longer a silver bullet. Threat actors have evolved. If your...

Learn More 6 2May 25

Why You Need Multi-Factor Authentication (MFA) on Every Account—Right Now

One password isn’t enough. Not in 2025. Not with phishing, data leaks, and account hijacking on the...

Learn More 0 0May 25

Bypassing Windows Defender in 2025: What DevSecOps Must Understand About Home vs. Enterprise

# Microsoft Defender in 2025: A Divided Security Landscape In 2025, Microsoft Defender remains the...

Learn More 0 0May 25

Is Microsoft Defender Enough in 2025?

If you're using a Windows computer in 2025, you already have an antivirus: Microsoft Defender...

Learn More 0 0May 25

Social Engineering 2.0: Recon Techniques Scammers Use on LinkedIn Targets

Social Engineering in 2025: The OSINT-Powered Attack Chain By 2025, social engineering...

Learn More 0 0May 25

How to Spot Fake Recruiters and Job Offers on LinkedIn in 2025

How to Spot and Avoid Fake Recruiters on LinkedIn in 2025 LinkedIn remains one of the...

Learn More 0 0May 25

Star My Repo and I'll Star Yours ⭐️ — Let's Support Each Other!

Hey devs! 👋 I'm building cool things and so are you. Whether it's open-source tools, hobby projects,...

Learn More 0 0May 22

Step-by-Step Guide to Set Up a Cron Job to Run a Report

HouseKeeping Setting Up a Free AWS EC2 Instance as a Baseline Development...

Learn More 0 0May 15

Creating Reports to Find Missing Data During the Normalization Process in SQL

Introduction Writing reports in SQL using report builder can be a lot of fun, but there...

Learn More 0 0May 15

Detailed Logic for RDF Conversion and Use in RDH (Robust Data Hub)

Overview Resource Description Framework (RDF) is a W3C-standardized model used to represent data as...

Learn More 0 0May 15

From Input to Impact: How Our RDH Turns Raw Data into Real-Time Signals

From Input to Impact: How Our RDH Turns Raw Data into Real-Time Signals So far on this...

Learn More 0 0May 8

From Input to Impact: How Our RDH Turns Raw Data into Real-Time Signals

From Input to Impact: How Our RDH Turns Raw Data into Real-Time Signals So far on this...

Learn More 0 0May 8

Building a Robust Data Hub: Understanding the Data Types That Power It

Building a Robust Data Hub: Understanding the Data Types That Power It When discussing a...

Learn More 0 0May 5

Open-Source AI Agent Frameworks

As the demand for intelligent, autonomous applications grows, developers are increasingly turning to...

Learn More 0 0May 4

Set Up Java Dev Environment on EC2 (Ubuntu): Free Tier

You can set up a full Spring Boot development environment (Java 17+, Maven, Spring Boot CLI, IntelliJ...

Learn More 0 0May 2