DEV Community

Rémi Lavedrine profile picture

Rémi Lavedrine

Software Dev turned Security Dev. Follow me on dev.to, twitch.tv/shostarsson or wildnsecure.com

Joined Joined on  github website

Work

Lead Security Engineer

8 Essential Services to Improve your Security on the Internet 🚀

8 Essential Services to Improve your Security on the Internet 🚀

4
Comments
1 min read

Want to connect with Rémi Lavedrine?

Create an account to connect with Rémi Lavedrine. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
A Complete Explanation to DevSecOps

A Complete Explanation to DevSecOps

2
Comments
1 min read
Dependency Confusion - How can you hack Apple, Microsoft and dozens of other companies?

Dependency Confusion - How can you hack Apple, Microsoft and dozens of other companies?

3
Comments
1 min read
Understand the TLS Handshake

Understand the TLS Handshake

4
Comments
1 min read
Your data are Gold 💰

Your data are Gold 💰

3
Comments 2
1 min read
Smartphone, a Spy in your Pocket

Smartphone, a Spy in your Pocket

2
Comments 1
1 min read
IAAS, PAAS, SAAS, On-Prem. Let's explain these with the brand new Pizza as a Service

IAAS, PAAS, SAAS, On-Prem. Let's explain these with the brand new Pizza as a Service

2
Comments
1 min read
How long to crack that password ?

How long to crack that password ?

1
Comments
1 min read
Is this the future of the Yubikey ?

Is this the future of the Yubikey ?

3
Comments 2
1 min read
9 Key Points about Passwords

9 Key Points about Passwords

2
Comments
1 min read
The 14 Financial Impacts of a Cyber ​​Attack 💸

The 14 Financial Impacts of a Cyber ​​Attack 💸

1
Comments
1 min read
How much for my personnal data on the Dark Web ?

How much for my personnal data on the Dark Web ?

1
Comments
1 min read
Bandit CTF — 6 to 10 Challenges Writeup

Bandit CTF — 6 to 10 Challenges Writeup

2
Comments
2 min read
Bandit CTF - 1 to 5 Challenges WriteUp

Bandit CTF - 1 to 5 Challenges WriteUp

3
Comments
2 min read
Should I train on CTF or Bug Bounty ?

Should I train on CTF or Bug Bounty ?

4
Comments
1 min read
WhatsApp Done. What about the Other Ones !!! - Cryptomator

WhatsApp Done. What about the Other Ones !!! - Cryptomator

3
Comments
1 min read
WhatsApp or Signal - Make an Informed Choice

WhatsApp or Signal - Make an Informed Choice

1
Comments
1 min read
Security by Design - Everything you need to know, in a simple manner.

Security by Design - Everything you need to know, in a simple manner.

5
Comments
1 min read
Mobile Password Management

Mobile Password Management

4
Comments 1
6 min read
The Ultimate Yubikey

The Ultimate Yubikey

7
Comments
1 min read
My Thoughts about the 2020 Github Universe

My Thoughts about the 2020 Github Universe

1
Comments
1 min read
How to Connect an Android Phone to a Docker Container ? - ADB, Docker, VSCode

How to Connect an Android Phone to a Docker Container ? - ADB, Docker, VSCode

14
Comments 1
2 min read
Learn from Data Breach

Learn from Data Breach

3
Comments 1
2 min read
Debug your Go app in a Docker Container

Debug your Go app in a Docker Container

2
Comments
2 min read
You've been on a Public Network ? That's bad Security Practice

You've been on a Public Network ? That's bad Security Practice

2
Comments
4 min read
Someone is watching you over the Internet. Protect and Fight Back - Man in the Middle

Someone is watching you over the Internet. Protect and Fight Back - Man in the Middle

12
Comments
8 min read
Don't you think you should stop pushing unsecure code on Github ? (OWASP)

Don't you think you should stop pushing unsecure code on Github ? (OWASP)

14
Comments 2
12 min read
Use your Yubikey to its Fullest

Use your Yubikey to its Fullest

23
Comments 4
9 min read
A Password is not Enough to Secure your Account. Use that as Well 🔐

A Password is not Enough to Secure your Account. Use that as Well 🔐

18
Comments
11 min read
Password Attacks CounterMeasures ⚔️

Password Attacks CounterMeasures ⚔️

30
Comments 2
6 min read
First Streaming Ever - Git Security

First Streaming Ever - Git Security

7
Comments
1 min read
Don't Let the Hackers Get onto your Files, either Personal or Professional.

Don't Let the Hackers Get onto your Files, either Personal or Professional.

13
Comments
5 min read
Add Sec to your DevOps Pipeline with Checkmarx

Add Sec to your DevOps Pipeline with Checkmarx

14
Comments
4 min read
How to Keep your Code Secure

How to Keep your Code Secure

32
Comments 3
10 min read
How to Use GPG to Sign your Commits on Github, Gitlab, Bitbucket

How to Use GPG to Sign your Commits on Github, Gitlab, Bitbucket

87
Comments 6
7 min read
How to Setup Multiple Ssh Keys for Multiple Github/Bitbucket accounts.

How to Setup Multiple Ssh Keys for Multiple Github/Bitbucket accounts.

158
Comments 29
6 min read
Application Obfuscation on iOS

Application Obfuscation on iOS

14
Comments 2
7 min read
The Git Rebase Workflow

The Git Rebase Workflow

72
Comments 11
2 min read
Security Headers to use on your webserver

Security Headers to use on your webserver

159
Comments 9
15 min read
Do you care about your privacy? Maybe it is time to set up your own Dropbox.

Do you care about your privacy? Maybe it is time to set up your own Dropbox.

205
Comments 12
5 min read
Start assessing the security of your Android application

Start assessing the security of your Android application

15
Comments 1
8 min read
Why you should share on dev.to (or anywhere else) what you know or just learn.

Why you should share on dev.to (or anywhere else) what you know or just learn.

41
Comments 5
3 min read
Do you use the Pomodoro Technique?

Do you use the Pomodoro Technique?

29
Comments 13
2 min read
Set up your Android app for Offensive Security

Set up your Android app for Offensive Security

23
Comments 2
6 min read
Offensive security on an Android app

Offensive security on an Android app

28
Comments 7
5 min read
Why you should practice security to better secure your application.

Why you should practice security to better secure your application.

23
Comments 2
4 min read
loading...