Endigest logo
Endigest
All Tech BlogsExplore TagsSend Feedback
Newsletter
Endigest logo
Endigest

© 2026 Endigest. All rights reserved.

  • About
  • Privacy
  • Terms
  • Contact
  • RSS

Security Articles

Explore real-world engineering experiences from top tech companies.

필터 초기화
⌘K
AllFrontendBackendAI / MLML OpsDevOpsMobileArchitectureData EngSecurityProductCulture

Get the latest tech trends every morning

Receive daily AI-curated summaries of engineering articles from top tech companies worldwide.

  • 1
  • More pages
  • 25
  • 26
Squareup logoSquareup
01 min read
Security•2024-12-16

Enhanced Authorization with Square

This post covers Square's three key tools for enhancing payment authorization rates and reducing fraud.

APIs
Microsoft logoMicrosoft
01 min read
Security•2024-09-25

Common annotated security keys

The article introduces Microsoft's Common Annotated Security Key (CASK) standard, an open format for minting identifiable security tokens that improve secret detection accuracy.

Engineering@Microsoft
1ES
ADO Azure DevOps GHAS
GitHub Advanced Security
sdl
security
Static analysis
Squareup logoSquareup
11 min read
Security•2024-07-10

Making Insights-Driven Decisions in an Ecosystem of Ecosystems

Block shares their data-driven cloud security platform and a GCP static credential elimination case study.

Engineering
Chromium logoChromium
111 min read
Security•2024-05-23

Advancing Our Amazing Bet on Asymmetric Cryptography

This Chromium Blog post discusses advances in asymmetric cryptography within the Chromium project.

Chromium logoChromium
24 min read
Security•2024-04-02

Fighting cookie theft using device bound sessions

This post from the Chromium Blog introduces device bound sessions as a defense mechanism against cookie theft attacks.

Squareup logoSquareup
01 min read
Security•2024-03-27

Leveraging Linux Internals to Supercharge Osquery Malware Detection

This post describes a novel technique combining osquery, YARA, and the Linux /proc filesystem to detect fileless and in-memory malware on Linux systems.

Engineering
Chromium logoChromium
04 min read
Security•2024-02-13

Optimizing Safe Browsing checks in Chrome

This post covers optimization techniques for Safe Browsing checks in the Chrome browser.

Trending This Week

#1
GitHub logoGitHub

Agent-driven development in Copilot Applied Science

13 views2026-03-31
#2
AWS logoAWS

Announcing managed daemon support for Amazon ECS Managed Instances

12 views2026-04-01
#3
Google Cloud logoGoogle Cloud

Spanner's multi-model advantage for the era of agentic AI

10 views2026-03-31
#4
AWS logoAWS

AWS Weekly Roundup: AWS DevOps Agent & Security Agent GA, Product Lifecycle updates, and more (April 6, 2026)

9 views2026-04-06
#5
The Hacker News logoThe Hacker News

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

9 views2026-03-31
#6
Google Cloud logoGoogle Cloud

How AI-powered tools are driving the next wave of sustainable infrastructure and reporting

9 views2026-03-31