Security-is-Not-a-Feature-Its-a-Foundation
dev.to·10h·
Discuss: DEV
🛡️Security Type Systems
Flag this post
Keys to the Kingdom: A Defender’s Guide to Privileged Account Monitoring
gixtools.net·2d
🛡️Security Type Systems
Flag this post
Security Doesn’t Have to Hurt
docker.com·14h
🛡️Security Type Systems
Flag this post
LLM AuthZ Handbook: A Practical Guide for AI Builders and Users
flatt.tech·1d·
Discuss: Hacker News
🔐Capability Calculus
Flag this post
BYOD security solutions explained
proton.me·14h
🔐Capability Protocols
Flag this post
The EU’s two-tier encryption vision is digital feudalism
cointelegraph.com·18h
🛡️Security Type Systems
Flag this post
Secretly Loyal AIs: Threat Vectors and Mitigation Strategies
lesswrong.com·3h
🛡️Security Type Systems
Flag this post
Agents Rule of Two: A Practical Approach to AI Agent Security
ai.meta.com·6h·
Discuss: Hacker News
🛡️Security Type Systems
Flag this post
When AI And Secure Chat Meet, Users Deserve Strong Controls Over How They Interact
techdirt.com·39m
🔐Capability Calculus
Flag this post
5 things I do to protect my home lab from potentially malicious services
xda-developers.com·7h
🛡️Capability VMs
Flag this post
FinWise Data Breach Exposes Insider Threats, Highlights Need for Strong Encryption and Key Management
blogger.com·10h
🔐Security Types
Flag this post
Privacy Risks of 1x Neo Robot
captaincompliance.com·8h·
Discuss: Hacker News
🔐Capability Protocols
Flag this post
From Beginner to Cyber-Aware: Lessons from My First Cybersecurity Course
netacad.com·1d·
Discuss: DEV
🛡️Security Type Systems
Flag this post
Stolen Credentials and Valid Account Abuse Remain Integral to Financially Motivated Intrusions
fortinet.com·1d
🔐Security Types
Flag this post
Keys to the Kingdom: A Defender's Guide to Privileged Account Monitoring
cloud.google.com·3d
🛡️Security Type Systems
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·7h
🛡️Parser Security
Flag this post
Minimal Sufficiency: A Principle ‘Similar’ to End-to-End
cacm.acm.org·8h·
Discuss: Hacker News
📡Protocol Stacks
Flag this post
MCP Security: Navigating the Exploit Playbook for Agent
dev.to·2h·
Discuss: DEV
🛡️Security Type Systems
Flag this post
Building Up And Sanding Down
endler.dev·1d
🔧API Design
Flag this post
Key principles of a successful internal developer platform
infoworld.com·1d
🧱First Principles
Flag this post