Tags
#beginners
"A journey of a thousand miles begins with a single step." -Chinese Proverb
#discuss
Discussion threads targeting the whole community
#career
This tag is for anything relating to careers! Job offers, workplace conflict, interviews, resumes, promotions, etc.
#aws
Amazon Web Services (AWS) is a collection of web services for computing, storage, machine learning, security, and more There are over 200+ AWS services as of 2023.
#news
Expect to see announcements of new and updated products, services, and features for languages & frameworks. You also will find high-level news relevant to the tech and software development industry covered here.
#azure
The dev.to tag for Microsoft Azure, the Cloud Computing Platform.
#education
Discussions on academic programs, online courses, and learning paths in security.
#tools
General discussion about all types of design software and hardware
#iot
Security challenges and solutions for Internet of Things and embedded devices.
#help
A place to ask questions and provide answers. We're here to work things out together.
#containers
Security for container technologies like Docker and orchestration platforms like Kubernetes.
#riskmanagement
Strategies for managing risk in crypto portfolios and trading.
#gcp
Discussions specific to Google Cloud Platform, its services, and best practices.
#devsecops
Integrating security practices into the DevOps lifecycle.
#iam
Identity and Access Management principles, technologies, and best practices.
#ethics
Discussions on ethical considerations and responsibilities in design
#compliance
Navigating compliance standards like PCI-DSS, HIPAA, GDPR, and SOX.
#homelab
Showcasing and discussing personal lab setups for security practice and research.
#cloudsecurity
Securing cloud environments like AWS, Azure, and GCP, including configurations and services.
#mentorship
A place to talk about all things mentorship! Mentors and mentees can introduce themselves, share posts about their experiences, and connect with one another under this tag.
#cryptography
Discussions on encryption, hashing, ciphers, and cryptographic protocols.
#ctf
Capture The Flag competitions, challenges, writeups, and strategies.
#legal
Examining cyber laws, regulations, and the legal aspects of security work.
#appsec
Application security topics beyond the web, including mobile and desktop applications.
#redteam
Adversary emulation, advanced persistent threat simulation, and red team operations.
#incidentresponse
The process of responding to and managing security incidents and breaches.
#soc
Discussions related to Security Operations Centers, including tools, processes, and analyst life.
#certifications
Discussions about security certifications, study guides, and exam experiences.
#nmap
Usage, scripting, and advanced techniques for the Nmap network scanner.
#threathunting
Proactively searching through networks to detect and isolate advanced threats.
#grc
Governance, Risk, and Compliance frameworks, policies, and management.
#securecoding
Best practices for writing secure code and preventing common vulnerabilities.
#purpleteam
Fostering collaboration between red and blue teams to maximize security effectiveness.
#zerotrust
Implementing and discussing the Zero Trust security model and architecture.
#exploitdev
The art and science of exploit development and vulnerability research.
#reversing
Reverse engineering software, firmware, and hardware.
#pentesting
Offensive security techniques and methodologies for penetration testing.
#wireshark
Packet analysis, protocol dissection, and network troubleshooting with Wireshark.
#cissp
Discussions and resources for the CISSP management-focused certification.
#dfir
Digital Forensics and Incident Response procedures, tools, and case studies.
#physicalsecurity
Lockpicking, access control systems, and securing physical environments.
#malwareanalysis
The study of malware to understand its behavior, origin, and purpose.
#networksec
Security of computer networks, including firewalls, IDS/IPS, and secure architecture.
#blueteam
Defensive security strategies, threat detection, and incident response.
#hardwarehacking
Modifying and exploiting physical hardware components.
#mitreattack
Using the MITRE ATT&CK framework for threat modeling and adversary emulation.
#interviewprep
Sharing interview experiences, questions, and preparation strategies for security roles.
#burpsuite
Tips, tricks, and extensions for the Burp Suite web vulnerability scanner.
#websec
Web application security, vulnerability analysis, and secure development for the web.
#ghidra
Using the Ghidra software reverse engineering suite for analysis and research.
#owasp
Discussions related to the OWASP Foundation, its projects, and Top 10 lists.
#socialengineering
The psychological manipulation of people into performing actions or divulging information.
#threatintel
Gathering, analyzing, and applying intelligence about threats and threat actors.
#mobilesec
Security for mobile operating systems like Android and iOS, and mobile applications.
#forensics
Techniques and tools for digital forensic investigation and evidence handling.
#wireless
Security of wireless technologies including Wi-Fi, Bluetooth, RFID, and NFC.
#oscp
Study guides, tips, and experiences related to the OSCP certification.
#consulting
The business of security consulting, freelancing, and running an MSSP.
#securityplus
Study materials and discussion for the CompTIA Security+ certification.
#osint
Open-Source Intelligence gathering techniques, tools, and resources.