🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Capability Security

Object Capabilities, Principle of Least Authority, Secure Composition, Access Control

Multi user authentication with multi user access and multi role access
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”Capability Systems
Networks aren’t fragile because of change, they’re fragile because they change without structure
techradar.comΒ·5h
πŸ€–Network Automation
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comΒ·22h
πŸ”—Data Provenance
Maturing your smart contracts beyond private key risk
blog.trailofbits.comΒ·1d
πŸ”Quantum Security
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.orgΒ·17hΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
RedirectionGuard: Mitigating unsafe junction traversal in Windows
msrc.microsoft.comΒ·12h
πŸ’£ZIP Vulnerabilities
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.comΒ·9h
🎯Threat Hunting
How to Quantify Risk and Communicate Effectively: Step 4 to TruRiskβ„’
blog.qualys.comΒ·4h
🎯Threat Hunting
Generative AI Exacerbates Software Supply Chain Risks
darkreading.comΒ·5h
πŸ”’WASM Capabilities
Permission Delegation: Unlocking a New Era of XRPL Account Management
dev.toΒ·22hΒ·
Discuss: DEV
πŸ”Capability Systems
Critical Security Importance Digital Age Web Techniques(1750818928214500οΌ‰
dev.toΒ·16hΒ·
Discuss: DEV
πŸ”’WASM Capabilities
The Rise of Security Augmentation (2022)
strategyofsecurity.comΒ·2dΒ·
Discuss: Hacker News
πŸ”Capability Systems
Trusting the tech: using password managers and passkeys to help you stay secure online
ncsc.gov.ukΒ·1d
πŸ”“Password Cracking
How Not to Get Lost in PCI DSS Standards β€” A Tech Team’s Perspective
hackernoon.comΒ·12h
πŸ”—Data Provenance
A Standard for Human-Centered Investigation Playbooks
chrissanders.orgΒ·34m
🎯Threat Hunting
Encrypting identifiers in practice
sjoerdlangkemper.nlΒ·14h
🌊Stream Ciphers
SSL and TLS Deployment Best Practices
github.comΒ·20hΒ·
Discuss: Hacker News
πŸ”Certificate Analysis
How to Speed Up TPRM Approvals with Spectra Assure
reversinglabs.comΒ·7h
πŸ”’Hardware Attestation
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.toΒ·6hΒ·
Discuss: DEV
πŸ”Homomorphic Encryption
Linux Jargon Buster: What are Secure Boot & Shim Files?
itsfoss.comΒ·11h
πŸ”’Secure Boot
Loading...Loading more...
AboutBlogChangelogRoadmap