DEV Community

Dwayne McDaniel profile picture

Dwayne McDaniel

Dwayne has been working as a Developer Relations professional since 2015 and has been involved in tech communities since 2005. He loves sharing his knowledge all around the world!

Location Chicago, IL Joined Joined on  Personal website https://dwayne-mcdaniel.com/

Work

Developer Evangelist

Four Year Club
Three Year Club
Top 7
Two Year Club
Writing Debut
8 Week Writing Streak
One Year Club
4 Week Writing Streak
AI Agents Security for Developers: Don't Let Your Agents Become a Liability

AI Agents Security for Developers: Don't Let Your Agents Become a Liability

1
Comments
9 min read
How We Got a CISA GitHub Leak Taken Down in Under a Day

How We Got a CISA GitHub Leak Taken Down in Under a Day

Comments
2 min read
The Future Of GitHub Actions Security And What You Can Do Right Now

The Future Of GitHub Actions Security And What You Can Do Right Now

Comments
6 min read
Vercel April 2026 Incident: Non-Sensitive Environment Variables Need Investigation Too

Vercel April 2026 Incident: Non-Sensitive Environment Variables Need Investigation Too

Comments
3 min read
The Bot Left a Fingerprint: Detecting and Attributing LLM-Generated Passwords

The Bot Left a Fingerprint: Detecting and Attributing LLM-Generated Passwords

1
Comments 1
5 min read
GitGuardian Now Flags Admin and Overprivileged Identities Across AWS, Entra, and Okta

GitGuardian Now Flags Admin and Overprivileged Identities Across AWS, Entra, and Okta

Comments
5 min read
Identity Access Management Strategy for Non-Human Identities

Identity Access Management Strategy for Non-Human Identities

2
Comments 1
6 min read
Top 11 Identity Orchestration Tools and Platforms for 2026

Top 11 Identity Orchestration Tools and Platforms for 2026

Comments
8 min read
API Keys Security & Secrets Management Best Practices

API Keys Security & Secrets Management Best Practices

Comments
8 min read
Local Guardrails for Secrets Security in the Age of AI Coding Assistants

Local Guardrails for Secrets Security in the Age of AI Coding Assistants

1
Comments
8 min read
Git Clean, Git Remove file from commit - Cheatsheet

Git Clean, Git Remove file from commit - Cheatsheet

Comments
15 min read
Short-Lived Credentials in Agentic Systems: A Practical Trade-off Guide

Short-Lived Credentials in Agentic Systems: A Practical Trade-off Guide

1
Comments 1
11 min read
No Off Season: Three Supply Chain Campaigns Hit npm, PyPI, and Docker Hub in 48 Hours

No Off Season: Three Supply Chain Campaigns Hit npm, PyPI, and Docker Hub in 48 Hours

Comments
3 min read
SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top

SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top

Comments
10 min read
ATLSECCON 2026: Context, Identity, and Restraint in Modern Security

ATLSECCON 2026: Context, Identity, and Restraint in Modern Security

Comments
8 min read
What the Mythos-Ready Briefing Says About Credentials

What the Mythos-Ready Briefing Says About Credentials

Comments
6 min read
AI Agents Authentication: How Autonomous Systems Prove Identity

AI Agents Authentication: How Autonomous Systems Prove Identity

1
Comments
17 min read
When We Use AI To Ship Fast, Secrets Spread Fast

When We Use AI To Ship Fast, Secrets Spread Fast

Comments
11 min read
BSides SF 2026: Looking At Security Beyond The Next Big Bet

BSides SF 2026: Looking At Security Beyond The Next Big Bet

Comments
7 min read
Honeytokens on the Developer Workstation: When Cleanup Takes Time

Honeytokens on the Developer Workstation: When Cleanup Takes Time

1
Comments 1
9 min read
Chainguard Assemble 2026 and the Security Factory Mindset

Chainguard Assemble 2026 and the Security Factory Mindset

1
Comments
7 min read
AI Is Making Security More Agile: Highlights from ChiBrrCon 2026

AI Is Making Security More Agile: Highlights from ChiBrrCon 2026

2
Comments
8 min read
ConFoo 2026: Guardrails for Agentic AI, Prompts, and Supply Chains

ConFoo 2026: Guardrails for Agentic AI, Prompts, and Supply Chains

2
Comments
9 min read
From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps

From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps

Comments
7 min read
Lessons in Testing, Performance, and Legacy Systems from /dev/mtl 2025

Lessons in Testing, Performance, and Legacy Systems from /dev/mtl 2025

Comments
7 min read
Workload And Agentic Identity at Scale: Insights From CyberArk's Workload Identity Day Zero

Workload And Agentic Identity at Scale: Insights From CyberArk's Workload Identity Day Zero

Comments
6 min read
Queen City Con 0x3: Hacking And Embracing Resiliency

Queen City Con 0x3: Hacking And Embracing Resiliency

Comments
8 min read
Working Towards Improved PAM: Widening The Scope And Taking Control

Working Towards Improved PAM: Widening The Scope And Taking Control

Comments
6 min read
Rethinking Security Resilience And Getting Back To Basics At CornCon 11

Rethinking Security Resilience And Getting Back To Basics At CornCon 11

4
Comments
8 min read
SREday SF 2025: Human Centered SRE In An AI World

SREday SF 2025: Human Centered SRE In An AI World

Comments
7 min read
DevOps Days Philadelphia 2025: Security As A Control Loop, Resilience, Runtime Risks, And How AI Is Changing It

DevOps Days Philadelphia 2025: Security As A Control Loop, Resilience, Runtime Risks, And How AI Is Changing It

1
Comments
7 min read
OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together

OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together

Comments
7 min read
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Comments
7 min read
DjangoCon US 2025: Security, Simplicity, and Community

DjangoCon US 2025: Security, Simplicity, and Community

Comments
7 min read
BlueTeamCon 2025: Finding new approaches to security that don’t let perfect stand in the way of better

BlueTeamCon 2025: Finding new approaches to security that don’t let perfect stand in the way of better

Comments
7 min read
Why the Principle of Least Privilege Is Critical for Non-Human Identities

Why the Principle of Least Privilege Is Critical for Non-Human Identities

Comments
7 min read
Passwords, Resilience, And Being Human: Working Together For A Brighter Future At BSides Las Vegas 2025

Passwords, Resilience, And Being Human: Working Together For A Brighter Future At BSides Las Vegas 2025

Comments
10 min read
Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems

Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems

1
Comments
6 min read
When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

1
Comments
8 min read
The Role of AI and Compliance in Modern Risk Management: ShowMeCon 2025

The Role of AI and Compliance in Modern Risk Management: ShowMeCon 2025

Comments
7 min read
Identiverse 2025: Trust, Delegation, and the Era of Continuous Identity

Identiverse 2025: Trust, Delegation, and the Era of Continuous Identity

Comments 1
9 min read
Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

1
Comments
6 min read
Security Starts With Developer Enablement: Lessons From PHP TEK 2025

Security Starts With Developer Enablement: Lessons From PHP TEK 2025

1
Comments 2
6 min read
RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale

RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale

Comments
10 min read
Community Resilience as a Security Capability: Lessons from BSides SF 2025

Community Resilience as a Security Capability: Lessons from BSides SF 2025

Comments
6 min read
BSides Seattle 2025: Rebuilding Trust in Systems In The Age Of NHIs

BSides Seattle 2025: Rebuilding Trust in Systems In The Age Of NHIs

Comments
7 min read
Secrets Sprawl and AI: Why Your Non-Human Identities Need Attention Before You Deploy That LLM

Secrets Sprawl and AI: Why Your Non-Human Identities Need Attention Before You Deploy That LLM

Comments
6 min read
ATLSecCon 2025: Security Readiness Means Human Readiness

ATLSecCon 2025: Security Readiness Means Human Readiness

Comments
7 min read
AI Is the New Trust Boundary: STL TechWeek Reveals the Risk Shift

AI Is the New Trust Boundary: STL TechWeek Reveals the Risk Shift

1
Comments
7 min read
BSides San Diego 2025: Shifting the Risk Conversation By The Sea Shore

BSides San Diego 2025: Shifting the Risk Conversation By The Sea Shore

1
Comments 1
7 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

1
Comments
7 min read
The Hidden Breach: Secrets Leaked Outside the Codebase Pose a Serious Threat

The Hidden Breach: Secrets Leaked Outside the Codebase Pose a Serious Threat

1
Comments
8 min read
Devnexus: Bringing Java Into The Age Of AI

Devnexus: Bringing Java Into The Age Of AI

1
Comments
6 min read
Addressing The Growing Challenge of Generic Secrets: Beyond GitHub's Push Protection

Addressing The Growing Challenge of Generic Secrets: Beyond GitHub's Push Protection

1
Comments
8 min read
Wild West Hackin' Fest @ Mile High 2025: Building a Stronger Security Community Together

Wild West Hackin' Fest @ Mile High 2025: Building a Stronger Security Community Together

Comments
7 min read
Non-Human Identity Security in the Age of AI

Non-Human Identity Security in the Age of AI

Comments 1
7 min read
The Critical Role of CISOs in Managing IAM - Including Non-Human Identities

The Critical Role of CISOs in Managing IAM - Including Non-Human Identities

Comments
9 min read
Executive Order 14144 on Cybersecurity: Building on 2021's Foundation with Advanced NHI Security

Executive Order 14144 on Cybersecurity: Building on 2021's Foundation with Advanced NHI Security

Comments
6 min read
CodeMash 2025: A Community Conversation About NHI And Secrets Security

CodeMash 2025: A Community Conversation About NHI And Secrets Security

Comments
7 min read
OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know

OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know

Comments
11 min read
loading...