DEV Community

Andy Kofod profile picture

Andy Kofod

404 bio not found

Location Ohio Joined Joined on  github website

Work

Sr. Solutions Developer and Security Solutions Lead at Leading EDJE

Getting Started with Nmap for Pentesters

Getting Started with Nmap for Pentesters

10
Comments
8 min read

Want to connect with Andy Kofod?

Create an account to connect with Andy Kofod. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
The Fallout From log4j and What We Can Learn From It

The Fallout From log4j and What We Can Learn From It

6
Comments
7 min read
OWASP Top 10 for Developers: Using Components with Known Vulnerabilities

OWASP Top 10 for Developers: Using Components with Known Vulnerabilities

4
Comments
2 min read
Ransomware in the Cloud: What are the risks and how do you avoid them?

Ransomware in the Cloud: What are the risks and how do you avoid them?

2
Comments
5 min read
Ransomware: What is it and how do you avoid becoming a victim?

Ransomware: What is it and how do you avoid becoming a victim?

1
Comments
9 min read
OWASP Top 10 for Developers: Insufficient Logging and Monitoring

OWASP Top 10 for Developers: Insufficient Logging and Monitoring

2
Comments
6 min read
Cultivating a Security Focused Development Team

Cultivating a Security Focused Development Team

4
Comments
7 min read
Getting Started with AWS API Gateway

Getting Started with AWS API Gateway

11
Comments
8 min read
What's an API Gateway and How Do You Choose the Right One

What's an API Gateway and How Do You Choose the Right One

20
Comments 2
8 min read
Best Practices for Securing Your REST APIs

Best Practices for Securing Your REST APIs

102
Comments 3
4 min read
Why Password Length Matters

Why Password Length Matters

11
Comments 2
5 min read
Privacy Laws Are For Everyone - or at least they should be

Privacy Laws Are For Everyone - or at least they should be

5
Comments
4 min read
Brute Forcing Credentials with Burp Suite Interceptor

Brute Forcing Credentials with Burp Suite Interceptor

8
Comments
6 min read
Phishing with Fear: How scammers use our emotions against us

Phishing with Fear: How scammers use our emotions against us

1
Comments 1
9 min read
Inspecting Web Traffic with Burp Suite Proxy

Inspecting Web Traffic with Burp Suite Proxy

9
Comments
7 min read
Getting Started With Burp Suite

Getting Started With Burp Suite

20
Comments
5 min read
Types of Security Assessments and Which One is Right for Your Organization

Types of Security Assessments and Which One is Right for Your Organization

10
Comments
5 min read
loading...