Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Security
Broad
Authentication, Encryption, Vulnerabilities, Compliance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
17412
posts in
23.3
ms
Rebuilding
TLS
, Part 1 — Why Encryption Alone Is Not Enough
🔑
Cryptography
dev.to
·
4d
·
DEV
·
…
Building an
Authentication
System With Express
JWT
: A Step-by-Step Guide
🔑
Cryptography
jumpcloud.com
·
1d
·
DEV
·
…
Server
hardening
and attack surface
reduction
guide
🚧
Execution Guardrails
binadit.com
·
13h
·
DEV
·
…
Last Week in Security (
LWiS
)
🪟
ETW Patching
blog.badsectorlabs.com
·
2d
·
…
Your Security is My Security
🔒
Network Security
substackcdn.com
·
3d
·
Substack
·
…
Cross-Platform Threat Analysis with macOS, SSL
Decryption
, and 1,300+ New
Detections
: Release Notes
🦠
Malware Analysis
medium.com
·
2d
·
…
Secure Access
Tokens
in Web Applications: A
Practical
Guide From the Field
🎭
Token Impersonation
dzone.com
·
1d
·
…
How businesses can defend
themselves
against the rise of ‘
phishing
as a service’
🍯
Deception Technology
techradar.com
·
3d
·
…
DEW
#150 - macOS Endpoint Security Firewall,
EDR
telemetry updates & Supply Chain Bonanza
🎯
Threat Intelligence
detectionengineering.net
·
1d
·
…
Prevent
agentic identity
theft
🚧
Execution Guardrails
stackoverflow.blog
·
6d
·
…
Extracting
Authentication to a
Microservice
🏗️
Software Architecture
dev.to
·
21h
·
DEV
·
…
CyberDefenders
🚧
Execution Guardrails
dev.to
·
4h
·
DEV
·
…
Securing
the Agentic Era: AI Agents as First-Class Security
Principals
🛡️
AI Security
dev.to
·
2d
·
DEV
·
…
Why Cybersecurity
Compliance
Is Now a Strategic Business Asset — Not Just a Legal
Obligation
🗽
Technology Sovereignty
dev.to
·
1d
·
DEV
·
…
AuthZEN
Authorization API 1.0 Deep Dive: The Standard API That
Separates
Authorization Decisions from Enforcement
🚧
Execution Guardrails
dev.to
·
3d
·
DEV
·
…
Preventing Agent
Hijacking
With Cryptographic Identity and
RBAC
📦
Sandboxing
dev.to
·
2d
·
DEV
·
…
Why
bcrypt
Is Not Enough in 2026 And What We Built
Instead
💥
Exploit Dev
dev.to
·
6d
·
DEV
·
…
OWASP Top 10 –
A05
: Security
Misconfiguration
(Remediation Perspective)
🚧
Execution Guardrails
dev.to
·
6d
·
DEV
·
…
I Built a Production-Ready
Biometric
Auth
Microservice
. Here Are 5 Problems Nobody Warns You About.
🚧
Execution Guardrails
dev.to
·
4d
·
DEV
·
…
Inside a Cyber Attack: How Hackers Think,
Operate
, and
Exploit
Systems
⚔️
Offensive Secuity
dev.to
·
6d
·
DEV
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help