๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Capability Security

Object Capabilities, Principle of Least Authority, Secure Composition, Access Control

How Architectural Controls Help Can Fill the AI Security Gap
darkreading.comยท1d
๐Ÿ”’Language-based security
12 Best DevSecOps Tools for Your CI/CD Pipeline
boostsecurity.ioยท15h
๐Ÿ›ก๏ธCLI Security
Are we solving digital identity or revealing we've lost what we're proving?
syntheticauth.aiยท10hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
AI Agents Need Data Integrity
schneier.comยท19hยท
Discuss: www.schneier.com
๐Ÿ›ก๏ธPreservation Proofs
โ€˜The Immutable Laws of Securityโ€™ at 25: 5 corollaries for a new era
reversinglabs.comยท2d
๐Ÿ”’WASM Capabilities
I am the CEO of an endpoint management firm, and it's baffling how often governments overlook unsecured devices
techradar.comยท21h
๐Ÿ’พPersistence Strategies
Microsoft PC Manager: Critical gap allows privilege escalation
heise.deยท10h
๐Ÿ”ŒOperating system internals
US military wants to secure the internet by making it more quantum
newscientist.comยท13h
โš›๏ธQuantum Tape
A brief intro to threat modeling
shehackspurple.caยท11hยท
Discuss: Hacker News
๐Ÿ”’WASM Capabilities
Modern vehicle cybersecurity trends
securelist.comยท21h
๐Ÿ”ŒOperating system internals
Beyond the Hype: Critical Takeaways From BlackHat and Defcon
thenewstack.ioยท14h
๐ŸŽฏThreat Hunting
Learning Through Doing: From one language to another
blog.scottlogic.comยท1d
๐Ÿฆ€Rust Borrowing
Princeton IT Services Launches Accessibility Solutions for Smart Office Environments through our value added reseller division Tech365.io.
princetonits.comยท14h
โœ‹Tactile Computing
Mobile security and DSPT: a guide for NHS Trusts
jamf.comยท1d
๐Ÿ”คEBCDIC Privacy
Hacker and Physicist โ€“ A Tale of "Common Sense"
supasaf.comยท14hยท
Discuss: Hacker News
๐Ÿ”Cryptographic Archaeology
Cybersecurity Snapshot: Industrial Systems in Crosshairs of Russian Hackers, FBI Warns, as MITRE Updates List of Top Hardware Weaknesses
tenable.comยท17h
๐Ÿ”“Hacking
Comprehensive MCP Security Checklist: Protecting Your AI-Powered Infrastructure
lab.wallarm.comยท1d
๐Ÿ›ก๏ธCLI Security
Scaling Expert Oversight of AI: HackerOne's Human-in-the-Loop Methodology
hackerone.comยท1d
โšกProof Automation
Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth
unit42.paloaltonetworks.comยท1d
๐ŸŒDNS Security
Go Beyond Viper and Cobra: Declarative Field-Driven Configuration for Go Apps
dev.toยท4hยท
Discuss: DEV
๐Ÿ“‹Format Specification
Loading...Loading more...
AboutBlogChangelogRoadmap