BYOD security solutions explained
proton.meΒ·7h
πŸ”’Secure Boot
Flag this post
LLM AuthZ Handbook: A Practical Guide for AI Builders and Users
flatt.techΒ·1dΒ·
Discuss: Hacker News
πŸ”Capability Systems
Flag this post
Security Doesn’t Have to Hurt
docker.comΒ·7h
πŸ›‘Cybersecurity
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comΒ·5h
πŸ›‘οΈeBPF Security
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.comΒ·1d
πŸ”Quantum Security
Flag this post
Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness
tenable.comΒ·7h
πŸ”Capability Systems
Flag this post
State of the Source at ATO 2025: Licensing 201
opensource.orgΒ·4h
πŸ”“Open Source Software
Flag this post
Vulnerability Management – Process Perspective
blog.nviso.euΒ·3d
πŸ”Capability Systems
Flag this post
Evaluating Endpoint Management: Why legacy solutions don’t address modern concerns
jamf.comΒ·2d
πŸ”Capability Systems
Flag this post
From Connectivity to Capability: Rethinking the Digital Divide
internetsociety.orgΒ·5h
🌍Cultural Computing
Flag this post
Minimal Sufficiency: A Principle β€˜Similar’ to End-to-End
cacm.acm.orgΒ·1hΒ·
Discuss: Hacker News
πŸ”—Network Calculi
Flag this post
The new identity paradigm must be hybrid, not just human
techradar.comΒ·1d
🎫Kerberos History
Flag this post
The cryptography behind electronic passports
blog.trailofbits.comΒ·9hΒ·
Discuss: Hacker News
πŸ”Quantum Security
Flag this post
Security awareness: four pillars for staying safe online
pentestpartners.comΒ·1d
πŸ”“Hacking
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comΒ·10h
πŸ•΅οΈVector Smuggling
Flag this post
Building Up And Sanding Down
endler.devΒ·20h
πŸ”©Systems Programming
Flag this post
The Oversight Game: Learning to Cooperatively Balance an AI Agent's Safety and Autonomy
arxiv.orgΒ·16h
πŸ”²Cellular Automata
Flag this post
What Governance, Compliance & Risk Management Look Like in Strategic Outsourcing
dev.toΒ·10hΒ·
Discuss: DEV
πŸ”Capability Systems
Flag this post
The internet was made for privacy
doctorow.medium.comΒ·3h
🧲Magnetic Philosophy
Flag this post