Security Architecture, Network Security, Identity Verification, Perimeter-less Security

Feeds to Scour
SubscribedAll
Scoured 80672 posts in 267.0 ms
Zero Trust Lessons from a Real-World 5G Cloud Core Security Assessment
cloudsecurityalliance.org·2d·
Discuss: Hacker News
🏗️Terraform
Preview
Report Post
The Air Gap Fallacy: Why Identity is the Only Real Perimeter
dev.to·13h·
Discuss: DEV
🏗️Terraform
Preview
Report Post
Breaking Down AI's Trust Crisis: Model Collapse, And Need For Zero-Trust Governance
entrepreneur.com·1d
🎯Threat Modeling
Preview
Report Post
How open standards enable zero trust on commodity hardware
thenewstack.io·2d
🌐Distributed Systems
Preview
Report Post
Firewalla Introduces a Simpler Way to Remodel Large, Flat Home Networks with Zero Trust
cdrinfo.com·1d
🎯Threat Modeling
Preview
Report Post
Decentralized Identity in Practice: Benchmarking Latency, Cost, and Privacy
arxiv.org·6h
🏗️Terraform
Preview
Report Post
**Abstract:** This paper proposes a novel framework for achieving Byzantine Fault Tolerance (BFT) in post-quantum cryptographic settings, specifically addres...
freederia.com·53m
🌐Distributed Systems
Preview
Report Post
The Impostor Rigidity Principle: Structural Constraints on Impersonating Systems
zenodo.org·1d·
Discuss: Hacker News
🌐Distributed Systems
Preview
Report Post
A self-hosted, zero-knowledge dead man's switch
lastsignal.app·19h·
Discuss: Hacker News
🏗️Terraform
Preview
Report Post
Privacy and Agency: insights and discussion
luma.com·19h
🔑OAuth
Preview
Report Post
Follow Up: PGP vs. HTTPS for Software Authenticity
sh.itjust.works·2h
🔒Information Security
Preview
Report Post
AI-Fueled Fraud Forces Banks to Rethink Identity Checks
pymnts.com·2h
🔒Information Security
Preview
Report Post
Why Kubernetes Flat Networks Fail at Scale—and Why Your Cluster Needs a Security Hierarchy
tigera.io·12h
📊Observability
Preview
Report Post
The Trends Defining Cyber Security in 2026: Cyber Security Report 2026
blog.checkpoint.com·23h
🚨Incident Response
Preview
Report Post
LIFT: Byzantine Resilient Hub-Sampling
arxiv.org·6h
🌐Distributed Systems
Preview
Report Post
A Breakthrough That Cuts Blockchain Delays Nearly in Half
scitechdaily.com·6h
🌐Distributed Systems
Preview
Report Post
**Abstract:** Existing stateful firewall rule sets suffer from increasing complexity and are prone to misconfigurations, resulting in vulnerabilities and per...
freederia.com·19h
📊Observability
Preview
Report Post
Why the future of AI depends on trust, safety, and system quality
techxplore.com·1d
🎯Threat Modeling
Preview
Report Post
Group Note Draft: Cryptography usage in Web Standards
w3.org·5h
🔒Information Security
Preview
Report Post
Rethinking Authentication: A Two-Card Distributed Security Model
dev.to·2d·
Discuss: DEV
🎯Threat Modeling
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help