Security-is-Not-a-Feature-Its-a-Foundation
dev.to·1d·
Discuss: DEV
🛡️Security Type Systems
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.io·1d·
Discuss: Hacker News
🛡️Security Type Systems
Phones as a Fortress: 4th Amendment Castle Doctrine for the "Digital Home"
computerweekly.com·1h·
Discuss: Hacker News
🛡️Security Type Systems
Weaponized AI can dismantle patches in 72 hours — but Ivanti's kernel defense can help
venturebeat.com·3h
🛡️Capability VMs
Why ‘security as by-product’ is no replacement for modern tooling
reversinglabs.com·1d
🛡️Security Type Systems
Operable Software
ferd.ca·6h·
Discuss: Hacker News
Configuration Validation
The Day I Hacked XCTrack
blog.syrac.org·4h·
Discuss: Hacker News
🏷️Memory Tagging
Upcoming Open Source - Programmable Security Control Center
codepen.io·1d·
Discuss: r/programming
🛡️Security Type Systems
Don’t Let Your Cloud Security Catch a Bad Case of Permission Creep
tenable.com·3d
🛡️Capability VMs
6 free tools that should be on every self-hoster's machine
xda-developers.com·10h
🛡️Capability VMs
Zero Standing Privilege: Marginal Improvement on the Wrong Paradigm
gluufederation.medium.com·2d·
Discuss: Hacker News
🔐Capability Calculus
From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 1
cybernews.com·9h·
Discuss: DEV
🛡️Capability VMs
You’re Missing These Kubernetes SecurityContext Tricks — Capabilities, allowPrivilegeEscalation…
blog.devops.dev·1d
🛡️Capability VMs
How This Overlooked Security Risk Can Bring Your Startup Crashing Down Overnight
entrepreneur.com·2h
🥾Bootstrapping Strategies
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.com·4h·
Discuss: Hacker News
🛡️Parser Security
SSH Security: Why You Should Touch to Verify
ubicloud.com·11h·
Discuss: Hacker News
🏷️Memory Tagging
Ensuring Safe and Reliable Updates with Qualys TruRisk™ Manifest Version Control
blog.qualys.com·1d
🛡️Error Boundaries
Iterated Development and Study of Schemers (IDSS)
lesswrong.com·4h
🏰Capability Machines
Software Shouldn’t Be Windows/Mac-Only
reddit.com·20m·
Discuss: r/linux
💬Error Messages
Vulnerability Management – Requirements, Scoping & Target Setting
blog.nviso.eu·1d
🛡️Error Boundaries