Security Model: Wayland vs. Xorg in Linux
openlib.io·1h·
Discuss: Hacker News
🛡️RISC-V Security
The State of Security Protocols in Agent 2 Agent(A2A) Systems.
dev.to·1d·
Discuss: DEV
🔐Capability Systems
Zero Trust Access Made Simple for Contractors
blog.checkpoint.com·8h
🛡️WebAssembly Security
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·9h
🔐Cryptographic Archaeology
Sources of Power in Organizations
leadingsapiens.com·6h·
Discuss: Hacker News
🔐Capability Systems
They're in…now what? How to stop lateral movement when the phish bites
runzero.com·5h
🎫Kerberos Attacks
How Exposure Management Helped Three Companies Transform Their Cybersecurity Program
tenable.com·8h
🔗Data Provenance
OO Design Principles: GRASP patterns
slott56.github.io·2d
🔒WASM Capabilities
Reading the ENISA Threat Landscape 2025 report
securityaffairs.com·14h
🎯Threat Hunting
Purism Defends the Fourth Amendment in the Digital Age
puri.sm·3h
🧲Magnetic Philosophy
It’s time the UK got proactive about software security
techradar.com·7h
❄️Nix Adoption
The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·1d·
🔐PKI Archaeology
Public Key Infrastructure with Secure Shell
free-pmx.org·1d·
Discuss: r/homelab
🎯NTLM Attacks
Design Principle: Composable Services
sleepingpotato.com·8h·
Discuss: Hacker News
gRPC
The Engineer’s Guide to Automation Maturity
thenewstack.io·8h
📏Code Metrics
Are Software Registries Inherently Insecure?
developers.slashdot.org·20h
📦Container Security
SoK: Kicking CAN Down the Road. Systematizing CAN Security Knowledge
arxiv.org·17h
🔐Capability Systems
FIPS certified vs. FIPS compliant: What’s the real difference?
yubico.com·6h
🔐Certificate Analysis
WireGuard topologies for self-hosting at home
garrido.io·3d·
📡Network Protocol Design
Stalwart Labs
stalw.art·13h
Archive Fixity