Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Security
Broad
Authentication, Encryption, Vulnerabilities, Compliance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186684
posts in
13.5
ms
What are the most common
authentication
methods
?
🆔
Decentralized Identity (DID)
techtarget.com
·
1d
Password
Management
🔐
Hardware Security
nthp.me
·
3d
·
Hacker News
Help Net Security
🌐
Network Security
sh.itjust.works
·
10h
Introducing
Advanced
Account
Security
🔐
Hardware Security
openai.com
·
5h
·
Hacker News
Security is a
composite
system
🔓
DRM Analysis
aleksei.dev
·
1d
Odd
factor
authentication
🆔
Decentralized Identity (DID)
thefoggiest.dev
·
23h
2FA: A dedicated two-factor
authenticato
to
securely
manage one-time passwords
🆔
Decentralized Identity (DID)
codeberg.org
·
6d
·
Hacker News
What’s new,
updated
, or
recently
released in Microsoft Security
🌐
Network Security
microsoft.com
·
7h
How to Apply
STRIDE
Threat Modeling and
SonarQube
Analysis for Secure Software Development
🛡
Vulnerability Management
freecodecamp.org
·
2d
Building a Global
Standard
for Trust and Safety
⚖
AI Ethics & Alignment
aei.org
·
13h
A practical password policy
template
for
organizations
🛡️
Content Security Policy
proton.me
·
2d
Digital Shield:
Re-architecting
the
Hardcore
Security Paradigm in the Battle for Web3 Asset…
🔓
DRM Analysis
medium.com
·
6d
Stop changing weak
passwords
. Start replacing them with
passkeys
🔐
Hardware Security
pcworld.com
·
12h
Website Security Configuration Audit from Android in 15 Minutes:
curl
,
openssl
, dig
🛡️
Content Security Policy
github.com
·
1d
·
DEV
Can
Cross-Layer
Design Bridge Security and Efficiency? A Robust
Authentication
Framework for Healthcare Information Exchange Systems
🔓
DRM Analysis
arxiv.org
·
19h
Protecting
your secrets from
tomorrow
’s quantum risks
🔐
Hardware Security
aws.amazon.com
·
6d
Is your
connected
product ready for the Cyber
Resilience
Act?
🔐
Hardware Security
iotinsider.com
·
1d
TOTP
, SMS, Hardware Keys, and
Passkeys
: An Honest 2FA Comparison
🔐
Hardware Security
havenmessenger.com
·
23h
·
DEV
AI is the
present
of security
🛡️
AI Security
webflow.sysdig.com
·
23h
The
Tyranny
of Security
🔓
DRM Analysis
javvadmalik.com
·
1d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help