Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Security
Authentication, Encryption, Vulnerabilities, Compliance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
80260
posts in
959.2
ms
Novacoast
: Nearly 30 Years of
Relentless
Focus on Security, Services, and Customer Control
joegaeta.blogspot.com
·
3d
🔧
System Design
A Guide to building Advanced
RAGs
🏗️
dev.to
·
3d
·
Discuss:
DEV
✨
Code Quality
CCIE Security
DOO1/DOO2
, Stable Pass! & CCIE Security
Design1/Design2/Design3
, Stable Pass!
dev.to
·
4d
·
Discuss:
DEV
🎨
Software Design
Three
Investigative
Bottlenecks
– Three New Baseline Capabilities
forensicfocus.com
·
4d
⚡
Performance
How to Protect Your Active Directory with Duo’s New
MFA
and
Visibility
Solutions
duo.com
·
4d
🚀
DevOps
Client-Side
Encrypted
Posts in
Jekyll
joshbeckman.org
·
5d
·
Discuss:
Hacker News
🔵
Go
CodeShield
AI – Open-source security scanner (24% cheaper than
GitGuardian
)
lydiamorgan85.github.io
·
5d
·
Discuss:
Hacker News
✨
Code Quality
DYNOWIPER
:
Destructive
Malware Targeting Poland's Energy Sector
elastic.co
·
4d
💻
Software Engineering
Overview
datomic.com
·
4d
🔧
System Design
ACME
Certificate Management for Windows and Linux, simple free certificates for
IIS
and more, powered by Let's Encrypt and other
ACME
CAs
certifytheweb.com
·
3d
☁️
Cloud Computing
New Research from
UpGuard
: 1 in 5 Developers Grant AI Vibe Coding Tools
Unrestricted
Workstation Access
upguard.com
·
5d
·
Discuss:
Hacker News
✨
Code Quality
The
Agentic
Trust Framework: Zero Trust
Governance
for AI Agents
cloudsecurityalliance.org
·
5d
·
Discuss:
Hacker News
☁️
Cloud Computing
Gone Phishing, Got a Token: When Separate
Flaws
Combine
praetorian.com
·
5d
·
Discuss:
DEV
🏗
Software Architecture
Startup businesses need to take
cybersecurity
seriously
betanews.com
·
5d
☁️
Cloud Computing
The
Buyer
’s Guide to AI
Usage
Control
thehackernews.com
·
5d
🔧
System Design
roady001/Check-NotepadPlusPlusIOC
: Checks for indicators of compromise related to the Notepad++ supply chain attack.
github.com
·
5d
·
Discuss:
Hacker News
✨
Code Quality
Securing
GenAI: Vol. 8 — Deploying AI apps
securely
pub.towardsai.net
·
3d
✨
Code Quality
Google Calls on
Governments
and Industry to
Prepare
Now for Quantum-Era Cybersecurity
thequantuminsider.com
·
3d
☁️
Cloud Computing
US Gov
Directive
Cracks Down on
Unsupported
Edge Devices
decipher.sc
·
4d
☁️
Cloud Computing
Digital
Footprint
medium.com
·
2d
🏗
Software Architecture
Loading...
Loading more...
« Page 21
•
Page 23 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help