Explore real-world engineering experiences from top tech companies.
Receive daily AI-curated summaries of engineering articles from top tech companies worldwide.
Slack's enterprise search architecture prioritizes security and privacy when integrating external data sources like Google Drive and GitHub into Slack search.
This post describes how a Compute Security team built kube-policies, a custom Kubernetes admission controller on top of Open Policy Agent (OPA) to replace Pod Security Policies with adaptive security guardrails.
This post covers Square's three key tools for enhancing payment authorization rates and reducing fraud.
The article introduces Microsoft's Common Annotated Security Key (CASK) standard, an open format for minting identifiable security tokens that improve secret detection accuracy.
Block shares their data-driven cloud security platform and a GCP static credential elimination case study.
This Chromium Blog post discusses advances in asymmetric cryptography within the Chromium project.
This post from the Chromium Blog introduces device bound sessions as a defense mechanism against cookie theft attacks.
This post describes a novel technique combining osquery, YARA, and the Linux /proc filesystem to detect fileless and in-memory malware on Linux systems.
This post covers optimization techniques for Safe Browsing checks in the Chrome browser.