Vulnerability Management – Process Perspective
blog.nviso.euΒ·1d
πŸ”Capability Systems
Flag this post
Evaluating Endpoint Management: Why legacy solutions don’t address modern concerns
jamf.comΒ·15h
πŸ”Capability Systems
Flag this post
Making MLS More Decentralized
blog.phnx.imΒ·19hΒ·
Discuss: Hacker News
🌳Archive Merkle Trees
Flag this post
Building Intelligent Multi-Agent Systems with Context-Aware Coordination
dev.toΒ·3hΒ·
Discuss: DEV
✨Algebraic Effects
Flag this post
What Good Software Supply Chain Security Looks Like
thenewstack.ioΒ·11h
πŸ”—Supply Chain
Flag this post
10 Security Operations Center Best Practices Every Security Leader Should Know
vmray.comΒ·13h
🎯Threat Hunting
Flag this post
The Janusian Genesis: A Chronicle of Emergent Agency in a Self-Modifying Language Model (AI assisted)
funcall.blogspot.comΒ·22hΒ·
πŸ”²Cellular Automata
Flag this post
AWS account hygiene
me.micahrl.comΒ·17h
πŸ–₯️Self-hosted Infrastructure
Flag this post
AI-Driven, Quantum-Ready Network Security
paloaltonetworks.comΒ·1d
🏠Homelab Security
Flag this post
API Attack Awareness: Business Logic Abuse β€” Exploiting the Rules of the Game
lab.wallarm.comΒ·18h
🌐BGP Security
Flag this post
Smarter meeting spaces built on simplicity, trust, and intelligence
the-independent.comΒ·18h
πŸ”Capability Systems
Flag this post
5 Essential Steps to Strengthen Kubernetes Egress Security
tigera.ioΒ·1d
πŸ“¦Container Security
Flag this post
The Ethical Computing Initiative
aol.codeberg.pageΒ·15hΒ·
Discuss: Hacker News
🧲Magnetic Philosophy
Flag this post
Tap-and-Steal: The Rise of NFC Relay Malware on Mobile Devices
zimperium.comΒ·14h
🎫Kerberos Attacks
Flag this post
The art and science of effective security storytelling
redcanary.comΒ·2d
πŸ”—Data Provenance
Flag this post
The Proton Authenticator security model
proton.meΒ·15h
πŸ”PAKE Protocols
Flag this post
A Short Introduction to Categorical Logic
youtube.comΒ·2h
πŸ”€Category Theory
Flag this post
Covert Surveillance in Smart Devices: A SCOUR Framework Analysis of Youth Privacy Implications
arxiv.orgΒ·1d
πŸ•³οΈInformation Leakage
Flag this post
From Power Users to Protective Stewards: How to Tune Security Training for Specialized Employees
darkreading.comΒ·17h
🎯Threat Hunting
Flag this post
Re: A few comments on β€˜age’ (2019)
groups.google.comΒ·2dΒ·
Discuss: Lobsters
πŸ”Archive Encryption
Flag this post