Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Capability Systems
Object Capabilities, Access Control, Security Models, seL4
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
16749
posts in
195.2
ms
Authentication in 2026 - moving beyond
foundational
MFA
to tackle the new era of attacks
techradar.com
·
2h
🔐
HSM Integration
A
practical
systems engineering guide:
Architecting
AI-ready infrastructure for the agentic era
thenewstack.io
·
19h
⚙️
TLA+
Towards
Perfect
Vulnerability
Management System
worklifenotes.com
·
20h
·
Discuss:
Hacker News
✅
Archive Fixity
80% of Fortune 500 use active AI Agents:
Observability
, governance, and security shape the new
frontier
microsoft.com
·
2h
🎯
Threat Hunting
Identity Access Management:
pillar
of security and
compliance
clever.cloud
·
1d
🔒
WASM Capabilities
SAGE
: Scalable AI
Governance
& Evaluation
arxiv.org
·
13h
🤖
AI Curation
OCapN
and
Structural
Authority in Agentic AI
serefayar.substack.com
·
1d
·
Discuss:
Substack
,
r/programming
🔒
WASM Capabilities
Domain
Specific
Languages
martinfowler.com
·
3h
🗣️
Domain-Specific Languages
Rust Memory Management: The
Playroom
Analogy
adacore.com
·
3h
·
Discuss:
Hacker News
🦀
Rust Borrowing
What
Anthropic
’s Latest Model Reveals About the Future of
Cybersecurity
tenable.com
·
19h
💾
Persistence Strategies
Beyond
Login
Screens
: Why Access Control Matters
blog.sucuri.net
·
3d
🔐
Capability Security
The Myth of “Known APIs”: Why
Inventory-First
Security Models Are Already
Obsolete
lab.wallarm.com
·
1d
🔒
WASM Capabilities
Circumstantial
Complexity
, LLMs and Large Scale Architecture
datagubbe.se
·
1d
·
Discuss:
Hacker News
⚙️
Proof Engineering
How One Engineer Turned Saudi Cloud
Compliance
from a 6-Month
Bottleneck
into a 2-Week Workflow
hackernoon.com
·
5h
🔍
BitFunnel
Microsoft
boffins
figured
out how to break LLM safety guardrails with one simple prompt
theregister.com
·
18h
🧪
Protocol Fuzzing
Reducing
Technical
Debt: Top Five Coding Resources
loufranco.com
·
1d
📏
Code Metrics
SHIELD.md
: A Security Standard for
OpenClaw
and AI Agents
blog.securitybreak.io
·
1d
🛡️
CLI Security
Show HN:
C-CMCP
–
Validated
AI development workflow with quality gates
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
📏
Code Metrics
Force
Multiplier
in Cybersecurity: Sharing Intelligence in a Complex Threat
Landscape
cyberthreatalliance.org
·
7h
🎯
Threat Hunting
WonderfulSoap/ToolBake
: A Toolbox Platform for Creating Your Own Tools. Bake Them with Code or AI.
github.com
·
4h
·
Discuss:
Hacker News
🛡️
WebAssembly Security
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help