Endigest logo
Endigest
All Tech BlogsExplore TagsSend Feedback
Newsletter
Endigest logo
Endigest

© 2026 Endigest. All rights reserved.

  • About
  • Privacy
  • Terms
  • Contact
  • RSS

Security Articles

Explore real-world engineering experiences from top tech companies.

필터 초기화
⌘K
AllFrontendBackendAI / MLML OpsDevOpsMobileArchitectureData EngSecurityProductCulture

Get the latest tech trends every morning

Receive daily AI-curated summaries of engineering articles from top tech companies worldwide.

  • 1
  • More pages
  • 22
  • 23
Slack logoSlack
11 min read
Security•2025-03-07

How we built enterprise search to be secure and private

Slack's enterprise search architecture prioritizes security and privacy when integrating external data sources like Google Drive and GitHub into Slack search.

Uncategorized
Squareup logoSquareup
11 min read
Security•2025-01-28

Kube-Policies: Guardrails for Apps Running in Kubernetes

This post describes how a Compute Security team built kube-policies, a custom Kubernetes admission controller on top of Open Policy Agent (OPA) to replace Pod Security Policies with adaptive security guardrails.

Engineering
Squareup logoSquareup
01 min read
Security•2024-12-16

Enhanced Authorization with Square

This post covers Square's three key tools for enhancing payment authorization rates and reducing fraud.

APIs
Microsoft logoMicrosoft
01 min read
Security•2024-09-25

Common annotated security keys

The article introduces Microsoft's Common Annotated Security Key (CASK) standard, an open format for minting identifiable security tokens that improve secret detection accuracy.

Engineering@Microsoft
1ES
ADO Azure DevOps GHAS
GitHub Advanced Security
sdl
security
Static analysis
Squareup logoSquareup
11 min read
Security•2024-07-10

Making Insights-Driven Decisions in an Ecosystem of Ecosystems

Block shares their data-driven cloud security platform and a GCP static credential elimination case study.

Engineering
Chromium logoChromium
111 min read
Security•2024-05-23

Advancing Our Amazing Bet on Asymmetric Cryptography

This Chromium Blog post discusses advances in asymmetric cryptography within the Chromium project.

Chromium logoChromium
24 min read
Security•2024-04-02

Fighting cookie theft using device bound sessions

This post from the Chromium Blog introduces device bound sessions as a defense mechanism against cookie theft attacks.

Squareup logoSquareup
01 min read
Security•2024-03-27

Leveraging Linux Internals to Supercharge Osquery Malware Detection

This post describes a novel technique combining osquery, YARA, and the Linux /proc filesystem to detect fileless and in-memory malware on Linux systems.

Engineering
Chromium logoChromium
04 min read
Security•2024-02-13

Optimizing Safe Browsing checks in Chrome

This post covers optimization techniques for Safe Browsing checks in the Chrome browser.

Trending This Week

#1
GitHub logoGitHub

Agent-driven development in Copilot Applied Science

11 views2026-03-31
#2
The Hacker News logoThe Hacker News

Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts

9 views2026-03-31
#3
Google Cloud logoGoogle Cloud

Spanner's multi-model advantage for the era of agentic AI

8 views2026-03-31
#4
The Hacker News logoThe Hacker News

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

8 views2026-03-31
#5
Google Cloud logoGoogle Cloud

How AI-powered tools are driving the next wave of sustainable infrastructure and reporting

8 views2026-03-31
#6
Databricks logoDatabricks

What is a Cloud-Based Database Management System?

8 views2026-03-25