Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Security
Authentication, Encryption, Vulnerabilities, Compliance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74294
posts in
305.4
ms
Data Protection Authority in hot water: personal info leaked
amidst
security
oversight
nltimes.nl
·
2d
🛡️
Privacy Engineering
How to Build Production-Ready
Genie
Spaces
, and Build Trust Along the Way
databricks.com
·
2d
👁️
ClickHouse MaterializedViews
Unsupervised
Learning NO. 515
newsletter.danielmiessler.com
·
2d
💬
Prompt Engineering
Anatomy
of a
5-Layer
Defence Pipeline for AI Agent Memory
dev.to
·
1d
·
Discuss:
DEV
🔗
Intrusive Containers
Security news weekly round-up
dev.to
·
2d
·
Discuss:
DEV
🛡️
Packet Filtering
How to become a
degenerate
hacker
... a beginner's guide
youtube.com
·
3d
🔓
Binary Exploitation
Building
greater
resilience and
capacity
in the US national security industrial base
brookings.edu
·
2d
🌍
Geopolitics
Manage
Your
dotFiles
like a Boss
troydm.github.io
·
3d
📁
Dotfiles
The security implementation gap: Why Microsoft is
supporting
Operation Winter
SHIELD
microsoft.com
·
3d
🔐
Capability Systems
Five
Predictions
for
Cyber
Security Trends in 2026
heimdalsecurity.com
·
5d
🛡️
Cybersecurity
Your
router
's default
password
is probably on a public database
makeuseof.com
·
2d
🛡️
Packet Filtering
CySecurity
News - Latest Information Security and Hacking
Incidents
: A New Twist on Old Cyber Tricks
cysecurity.news
·
21h
·
Discuss:
Blogger
🔐
Hardware Security
On the Promises of '
High-Assurance
'
Cryptography
symbolic.software
·
4d
·
Discuss:
Lobsters
,
Hacker News
🌳
Merkle Trees
Best
Credentialing
Software of 2026
theaisurf.com
·
2d
📝
Write-Ahead Logging
The 10-Layer Monitoring Framework That Saved Our
Clients
From 3 a.m.
Pages
devops.com
·
3d
🔭
Tracing
Delivering
a secure, open, and
sovereign
digital world
cloud.google.com
·
2d
🔒
Digital Privacy
Securing
GenAI: Vol. 8 — Deploying AI apps
securely
pub.towardsai.net
·
2d
🛡️
AI Security
Day 5 AWS Shared Responsibility Model
andAWS
Well-Architected
Framework (5 Pillars)
blog.devops.dev
·
3d
🏗️
System Design
The Power of Proof: Turning
CMMC
Compliance into Competitive
Credibility
semiengineering.com
·
4d
🧪
Jepsen Testing
Microsoft
SDL
:
Evolving
security practices for an AI-powered world
microsoft.com
·
5d
🛡️
AI Security
Loading...
Loading more...
« Page 11
•
Page 13 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help