Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Security
Authentication, Encryption, Vulnerabilities, Compliance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74333
posts in
1.01
s
Purpose-Driven
Compliance
corpgov.law.harvard.edu
·
5d
🌊
CALM Theorem
Hack-Proofing
Our Space Infrastructure
realcleardefense.com
·
3d
🔐
Capability Systems
The Best
Two-Factor
Authentication (
2FA
) Apps
vice.com
·
6d
🔐
Capability Systems
Recent
trends in the work of the
Django
Security Team
djangoproject.com
·
5d
·
Discuss:
Lobsters
,
Hacker News
🛡️
AI Security
The methodology behind the LLM contamination paper getting
sustained
cloning
adversarialbaseline.substack.com
·
3d
·
Discuss:
Substack
🛡️
AI Security
We are
QA
Engineers
now
serce.me
·
4d
·
Discuss:
Lobsters
,
Hacker News
,
r/programming
🧪
Testing
Hostile
(
Corporate
) Architecture
thevinter.com
·
5d
·
Discuss:
Hacker News
🔐
Capability Systems
"
Detective
Work We Shouldn't Have to Do":
Practitioner
Challenges in Regulatory-Aligned Data Quality in Machine Learning Systems
arxiv.org
·
3d
🧠
Machine Learning
tarek-clarke/resilient-rap-framework
: To test the
viability
of a resilient analytical pipeline for clinical and sports health telemetry
github.com
·
4d
·
Discuss:
Hacker News
📡
SonarQube
pocket-id/pocket-id: A simple and easy-to-use
OIDC
provider that allows users to
authenticate
with their passkeys to your services.
github.com
·
3d
🔑
Kanidm
The
Birthmark
Standard: Privacy-Preserving Photo Authentication via Hardware Roots of Trust and
Consortium
Blockchain
arxiv.org
·
3d
🏷️
Memory Tagging
Coding Agents Need More Than
Examples
. They Need
Guardrails
.
medium.com
·
5d
·
Discuss:
Hacker News
🏗️
Pavex
Making the CISA
KEV
actionable
for real-world risk
runzero.com
·
4d
🦅
Falco
Hacker
claims theft of data from 700,000
Substack
users; Company confirms breach
securityaffairs.com
·
3d
🛡️
Cybersecurity
Recent Data
Breach
Examples
securityscorecard.com
·
5d
🔍
Digital Forensics
MomentProof
Deploys
Patented
Digital Asset Protection
devops.com
·
5d
🔐
Capability Systems
MomentProof
Deploys
Patented
Digital Asset Protection
hackread.com
·
5d
🔐
Capability Systems
6 things I always do after
setting
up a new
SBC
(and you should too)
xda-developers.com
·
17h
🔐
Hardware Security
8 Top
MDR
Providers
for Mid-Market Companies
hackread.com
·
23h
📝
Write-Ahead Logging
How to
reduce
the risks of
AI-generated
code
infoworld.com
·
4d
🎭
Program Synthesis
Loading...
Loading more...
« Page 17
•
Page 19 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help