How to implement resource-based authorization (resource-based vs. role-based vs. attribute-based)
cerbos.dev·6h·
Discuss: r/programming
⚖️AI Governance
Flag this post
A Security Model for Systemd
lwn.net·1d·
🛠cybersecurity
Flag this post
The Three Laws of AI Security
auth0.com·20h
⚖️AI Governance
Flag this post
Managing Data Security, User Permissions, and Role-Based Access in No-Code Apps: A Complete Guide.
dev.to·14h·
Discuss: DEV
🛡️Privacy Engineering
Flag this post
[SBA-ADV-20250729-01] CVE-2025-39663: Checkmk Cross Site Scripting
seclists.org·7h
🛠cybersecurity
Flag this post
Meta’s ‘Rule of Two’ Is Dangerous: The AI Security Crisis No One’s Admitting
pub.towardsai.net·16h
🔒MLSecOps
Flag this post
Site Unseen: Enumerating and Attacking Active Directory Sites
synacktiv.com·2d
🛠cybersecurity
Flag this post
A self-hosted Security Operations Center in a box to avoid vendor lock
github.com·11h·
🔒MLSecOps
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.com·2d
🛠cybersecurity
Flag this post
You're basically an admin once you know these 6 Linux permissions commands
makeuseof.com·1d
compliance
Flag this post
A security platform to ruin your next weekend 😍
google.com·11h·
Discuss: r/selfhosted
🛠cybersecurity
Flag this post
Migrating from Open Policy Agent to Amazon Verified Permissions
aws.amazon.com·2d
compliance
Flag this post
AIjacking Threat Exposed: How Hackers Hijacked Microsoft’s Copilot Agent Without a Single Click
blogger.com·4h
🛠cybersecurity
Flag this post
Facade Pattern — Catalog of Enterprise Application Architecture Patterns 🏢
dev.to·16h·
Discuss: DEV
compliance
Flag this post
Workload Identity in a Multi System Environment (Wimse) Architecture
datatracker.ietf.org·1d·
Discuss: Hacker News
🛠cybersecurity
Flag this post
The quiet revolution: How regulation is forcing cybersecurity accountability
cyberscoop.com·7h
🛠cybersecurity
Flag this post
Keeper Security's Industry-First Forcefield™ Protects Against Memory-Based Attacks on Windows Endpoints
prnewswire.com·1d
🔒MLSecOps
Flag this post
This Week in Security: Bogus Ransom, WordPress Plugins, and KASLR
hackaday.com·5h
🛠cybersecurity
Flag this post
Ray Security – Predictive Data Security Platform
raysecurity.io·1d·
Discuss: Hacker News
🔒MLSecOps
Flag this post
Securing Samba at the Global Level – Controlling the Server’s DNA
dev.to·2d·
Discuss: DEV
🛠cybersecurity
Flag this post