Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Security Patterns
Zero Trust, Cryptography, Authentication, Authorization
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
199854
posts in
31.7
ms
Implementing the
CISA
Zero Trust
Maturity
Model in Cloud Security Governance
🔐
Security
medium.com
·
2d
The path to zero trust:
Bridging
the gap between AI development and
OpSec
🔒
Container Security
redhat.com
·
3d
Confidentiality
is not security: Why the real AI runtime crisis Is the
Authorization
Gap
🛡️
AI Security
techradar.com
·
18h
Agent
authorization
is broken — and authentication
passing
makes it worse
📋
AGENTS.md
venturebeat.com
·
8h
Digital Identity for Agentic Systems: Toward a
Portable
Authorization
Standard for Autonomous Agents
🔐
Decentralized Identity
arxiv.org
·
2d
1,800+ MCP servers
exposed
without
authentication
: How zero trust can secure the AI agent revolution
🔒
Container Security
csoonline.com
·
3d
been following this
decentralised
security project,
curious
what people think
🔐
Decentralized Identity
tide.org
·
2d
·
r/SideProject
Fundamental
Security Concepts in Cybersecurity | Security+
SY0
–701 Domain 1 Chapter 2
🔐
Security
medium.com
·
2d
API Security in 2026: 7
Mistakes
Backend
Engineers Still Make
🔐
Security
secureroot.co
·
3d
·
DEV
PPLLA
: Privacy-preserving
attribute-based
LLM authorization
🔒
Privacy-Preserving Analytics
sciencedirect.com
·
1d
Build a zero trust AI pipeline with OpenShift and
RHEL
CVMs
🔒
Runtime Security
developers.redhat.com
·
2d
Post-Quantum Authenticated Key Exchange via
Signcryption
with
Ephemeral
Key Masking
🔐
Quantum Security
eprint.iacr.org
·
5d
identities-ai/ratify-protocol: Ratify Protocol™ — open cryptographic trust protocol for AI agent authorization. Hybrid
Ed25519
+ ML-DSA-65 (
FIPS
204). SDKs in Go, TypeScript, Python, Rust. By Identities AI, Inc.
🔒
Protocol Verification
github.com
·
1d
·
Hacker News
Laptops
all have built-in security
tokens
these days
🔑
Password Managers
ahelwer.ca
·
5d
·
Lobsters
,
Hacker News
The Hidden Danger of
Dirty
Flag Vulnerabilities: When
Stale
Trust Breaks Security
💣
Binary Exploitation
medium.com
·
2d
Physical
unclonable
functions based on chaotic vertical-cavity
surface-emitting
lasers for dynamic authentication
🌊
Stream Ciphers
nature.com
·
2d
The Grand Line of
Fine-Grained
Authorization
🔐
Capability Systems
fusionauth.io
·
6d
·
Hacker News
The
Authorization-Execution
Gap
Is a Major Safety and Security Problem in Open-World Agents
🧠
Context Engineering
arxiv.org
·
2d
A Unified Open-Set Framework for Scalable
PUF-Based
Authentication of
Heterogeneous
IoT Devices
🔐
Noise Protocol
arxiv.org
·
4d
"Training robust
watermarking
model may hurt authentication!'' Exploring and Mitigating the Identity
Leakage
in Robust
Watermarking
💧
Digital Watermarking
arxiv.org
·
3d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help