Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Zero Trust
zero trust security, identity, mTLS, access control
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
184089
posts in
26.3
ms
Sun Finance
automates
ID
extraction
and fraud detection with generative AI on AWS
⚙️
MLOps
aws.amazon.com
·
1h
Build Real-Time Identity
Pipelines
with
Auth0
Event Streams
🔌
APIs
auth0.com
·
18h
Identity
as the OS for AI Security
🛡️
AI Safety
cloudsecurityalliance.org
·
1d
France
probes
teenage
suspect in massive ID data breach
✍️
Prompt Engineering
scmp.com
·
4h
·
r/SCMPauto
VPN deal of the week:
Cyberghost
has dropped to only $1.75 per month, cheaper than
ExpressVPN
, NordVPN, and Surfshark – pick up this cut-price security tool to protect your identity on your tablet, smartphone, or TV while it's at its 2026 rock bottom.
🌐
Networking
techradar.com
·
10h
Anthropic Tool Access, EU App
Bypasses
, and
Active
Zero-Days
🔬
eBPF
bishopfox.com
·
5d
AAuth
🔌
APIs
aauth.dev
·
1d
·
Hacker News
RLS
sounds
great until it isn't
🔬
eBPF
planetscale.com
·
18h
·
Hacker News
Will Bank Identity: A
Geometric
System in
Yellow
🔤
Type Systems
abduzeedo.com
·
5h
Verifying
Humans Without
Surrendering
Identity: A Case Against Government-Issued Online Verification
✅
Formal Verification
blog.trintler.me
·
1d
·
Hacker News
How to Protect Personal Data Online From
Hackers
and Avoid Identity
Theft
🔐
Supply Chain Security
tweaktown.com
·
5d
Propagating
SharePoint Document
Permissions
to AI Search and RAG Pipelines
🛡️
AI Safety
devblogs.microsoft.com
·
11h
I moved from India to Canada for love. I felt like a
trailing
spouse
, but 3 steps helped me rebuild my identity.
✍️
Prompt Engineering
yahoo.com
·
1h
The Making of Digital
Identity
- 06 - The Mobile Revolution and the
Surveillance
Machine
🔬
eBPF
syntheticauth.ai
·
2d
·
Hacker News
,
r/programming
std
::experimental::
ranges
::identity (3) Linux Manual Page
🔍
Static Analysis
systutorials.com
·
18h
Suspect found with
ID
belonging
to others
🔤
Type Systems
saultstar.com
·
3h
·
saultstar.com
AI-Augmented
Social Engineering: When Trust
Becomes
a Control-Plane Risk
🛡️
AI Safety
zenodo.org
·
4d
·
Hacker News
Identity
attack path management starts to take off as AI raises the
stakes
🤖
AI Engineering
betanews.com
·
2d
Lip Critic – ‘Theft World’ review: a flurry of chaos,
paranoia
and
corrosive
desire
λ
Functional Programming
nme.com
·
10h
New solution
aids
rapid recovery from identity
incidents
🔐
Supply Chain Security
betanews.com
·
1d
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help