Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
dev.toยท1dยท
Discuss: DEV
๐Ÿ”’Digital Privacy
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.orgยท11h
๐Ÿ”eBPF
Flag this post
Credentials Evidence or Simulate
preludes.euยท1dยท
Discuss: Hacker News
๐Ÿ”’Digital Privacy
Flag this post
Securing the Wireless Perimeter: Modern Threats to AI, Hyperscale, Enterprise, and Classified Data Centers Part 2
bastille.netยท1d
๐ŸŒNetwork Security
Flag this post
Strong Authentication in a Post-Quantum World
kuppingercole.comยท1dยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
IoMT Vulnerabilities Putting Patient Health Data at Risk
hackernoon.comยท2d
๐ŸŒNetwork Security
Flag this post
Part 4: Daily Security Habits
open.forem.comยท1dยท
Discuss: DEV
๐Ÿ”Hardware Security
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.orgยท1dยท
Discuss: Hacker News
๐Ÿ“‹Protocol Design
Flag this post
Build your own GPG in Rust
andrewhalle.github.ioยท2dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
What We Learned from Subjecting LikhaERP to Independent VAPT Testing
dev.toยท2hยท
Discuss: DEV
๐ŸงชTesting
Flag this post
Building a P2P Rental Marketplace - Full-Stack Architecture with Flutter & Express.js
revolvo.techยท1hยท
Discuss: DEV
๐ŸŒAxum
Flag this post
Building and running Request Tracker as a quadlet container
developers.redhat.comยท8h
๐Ÿ”ŒgRPC
Flag this post
Ubuntu Blog: Edge Networking gets smarter: AI and 5G in action
ubuntu.comยท9h
๐ŸŒEdge Computing
Flag this post
An overview of the PPPP protocol for IoT cameras
palant.infoยท1hยท
Discuss: Hacker News
โšกQUIC Protocol
Flag this post
Building a highly-available web service without a database
screenshotbot.ioยท7hยท
Discuss: r/programming
๐Ÿฆ€Rust
Flag this post
dcaf: An implementation of the ACE-OAuth framework
docs.rsยท1dยท
Discuss: Hacker News
๐Ÿ”ChaCha20
Flag this post
HTB: Dump
0xdf.gitlab.ioยท1d
๐Ÿ”eBPF
Flag this post
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
dev.toยท22hยท
Discuss: DEV
๐Ÿ“ฆSerde
Flag this post
How does HTTP work?
corero.comยท13hยท
Discuss: DEV
๐ŸŒNetwork Protocols
Flag this post
Invasion of the message body snatchers! Teams flaw allowed crims to impersonate the boss
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธCybersecurity
Flag this post