Operable Software
ferd.ca·6h·
Discuss: Hacker News
👁️System Observability
Why ‘security as by-product’ is no replacement for modern tooling
reversinglabs.com·1d
🔐Capability Security
From Defender to Devil? Unintended Risk Interactions Induced by LLM Defenses
arxiv.org·15h
Effect Handlers
Autonomous architecture - problem description
disruptivearchitecture.info·10h
🌊Streaming Systems
What is a Capability?
apievangelist.com·3d
🔒WASM Capabilities
Microsoft Adds Agentic AI Capabilities to Sentinel
darkreading.com·3h
📊Homelab Monitoring
Vulnerability Management – Requirements, Scoping & Target Setting
blog.nviso.eu·1d
🔒WASM Capabilities
A Manifesto for the Programming Desperado
github.com·3h·
Discuss: Hacker News
💻Programming languages
Categorical systems theory
topos.institute·7h
🔀Category Theory
Why The Future of Code Is More Human Than Ever
dev.to·12h·
Discuss: DEV
📏Code Metrics
Open Lineage
usenix.org·15h
🔌Interface Evolution
Ensuring Safe and Reliable Updates with Qualys TruRisk™ Manifest Version Control
blog.qualys.com·1d
Archive Fixity
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.io·1d·
Discuss: Hacker News
🛡Cybersecurity
What Is Digital Supply Chain Management
securityscorecard.com·3h
🔗Supply Chain
How we built a structured Streamlit Application Framework in Snowflake
about.gitlab.com·19h
🌊Streaming Systems
Access Control Policy Generation from High-Level Natural Language Requirements
dl.acm.org·1d·
Discuss: Hacker News
🔒Language-based security
Product comparison: Detectify vs. Tenable
blog.detectify.com·11h
🎯Threat Hunting
Navigating the Vast AI Security Tools Landscape
optiv.com·21h
🎯Threat Hunting
When AI Remembers Too Much – Persistent Behaviors in Agents’ Memory
unit42.paloaltonetworks.com·21h
🔲Cellular Automata
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.com·5h
🔓Hacking