Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Security Patterns
Zero Trust, Cryptography, Authentication, Authorization
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
183168
posts in
234.2
ms
Zero-Trust
Architectures
: A Practical Guide for
Designing
Secure Enterprise Networks
🔐
Zero Trust
medium.com
·
3d
The
Authentication
Layer
🔐
Decentralized Identity
stylman.substack.com
·
2d
·
Substack
How
Authentication
Actually Works
🔑
Authentication
coderoasis.com
·
23h
DORA
and operational resilience:
Credential
management as a financial risk control
🔒
Security
bleepingcomputer.com
·
2d
Secure and
Updatable
Single
Password
Authentication
🔓
Password Cracking
eprint.iacr.org
·
5d
Additive
Cryptography for
TLS
🔑
Cryptography
snkth.com
·
1d
Secure
Managed
File Transfer Software: Progress Software |
SourceForge
Podcast, episode #110...
🔒
Runtime Security
sourceforge.net
·
2d
Behavioral
Credentials
: Why Static Authorization Fails Autonomous Agents
🧠
Context Engineering
oreilly.com
·
3d
Illya-Kryushenko/architecture-as-code
: Structured architecture models linked to CAF, Zero Trust, and Infrastructure as Code
🏗️
Infrastructure-as-Code
github.com
·
1d
·
DEV
Most Organizations Are Not Doing Zero Trust. They Are Doing
Selective
Hardening
.
🔐
Zero Trust
medium.com
·
3d
Pact:
Trustworthy
Coordination for Multi-Agentic
Ecosystems
🕸️
Distributed Systems
basis.ai
·
2d
·
Hacker News
Strengthening authentication with
passkeys
: A
CISO
playbook
🔑
Passkeys
sophos.com
·
5d
The Global Service Mesh [2/4]:
mTLS
& Zero Trust with
Authorisation
Policies
🕸️
Service Mesh
medium.com
·
3d
Prove
You're 18 Without Showing Who You Are: The
Cryptography
Big Tech Won't Use
🔐
Decentralized Identity
caracomp.com
·
5d
·
DEV
Defence
Framework For Critical Infrastructure Of An
Enterprise
🔒
Network Security
medium.com
·
6d
Advancing secret sync with
workload
identity
federation
(7 minute read)
🔐
Decentralized Identity
hashicorp.com
·
5d
Day 1 as
NetFoundry
’s Senior Developer
Advocate
☁️
Cloudflare Workers
globalnerdy.com
·
6d
AAuth
Protocol
🛡️
Security Headers
dickhardt.github.io
·
6d
·
Hacker News
Sky computing with
OpenShift
Service Mesh and
SPIRE
, part 1: Foundations
☁️
Cloudflare Workers
developers.redhat.com
·
4d
Prove Identity Platform
connects
verification, authentication, and fraud
prevention
🔐
Decentralized Identity
helpnetsecurity.com
·
4d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help