<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
<channel>
    <title>Aegix Security Blog</title>
    <link>https://blog.aegix.dev</link>
    <description>Insights, research, and guides on modern application security, zero-trust architectures, and developer productivity.</description>
    <language>en-us</language>
    <lastBuildDate>Wed, 29 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://blog.aegix.dev/rss.xml" rel="self" type="application/rss+xml" />
    
    <image>
        <url>https://blog.aegix.dev/assets/aegix_logo.png</url>
        <title>Aegix Security Blog</title>
        <link>https://blog.aegix.dev</link>
    </image>

    <item>
        <title>Wasm: Near-Native Speed, Zero-Trust Execution</title>
        <link>https://blog.aegix.dev/posts/wasm-security.html</link>
        <guid isPermaLink="true">https://blog.aegix.dev/posts/wasm-security.html</guid>
        <pubDate>Wed, 29 Apr 2026 00:00:00 +0000</pubDate>
        <category>Architecture</category>
        <description><![CDATA[Exploring the security architecture and performance benefits of WebAssembly for modern systems programming.]]></description>
        <media:content url="https://blog.aegix.dev/assets/wasm_security.png" medium="image" />
    </item>

    <item>
        <title>Env Vars vs. KMS: The Secret Management Paradox</title>
        <link>https://blog.aegix.dev/posts/secrets-management.html</link>
        <guid isPermaLink="true">https://blog.aegix.dev/posts/secrets-management.html</guid>
        <pubDate>Tue, 28 Apr 2026 00:00:00 +0000</pubDate>
        <category>Research</category>
        <description><![CDATA[A deep dive into the security tradeoffs between environment variables and dedicated Key Management Systems in modern CI/CD pipelines.]]></description>
        <media:content url="https://blog.aegix.dev/assets/secrets_management.png" medium="image" />
    </item>

    <item>
        <title>Scaling Trust: A Guide to Envelope Encryption</title>
        <link>https://blog.aegix.dev/posts/envelope-encryption.html</link>
        <guid isPermaLink="true">https://blog.aegix.dev/posts/envelope-encryption.html</guid>
        <pubDate>Sun, 26 Apr 2026 00:00:00 +0000</pubDate>
        <category>Cryptography</category>
        <description><![CDATA[Protect your data at scale by mastering the relationship between DEKs and KEKs.]]></description>
        <media:content url="https://blog.aegix.dev/assets/envelope_encryption_hero_1777319572101.png" medium="image" />
    </item>

    <item>
        <title>Why Rust is the Future of Secure Systems</title>
        <link>https://blog.aegix.dev/posts/rust-future.html</link>
        <guid isPermaLink="true">https://blog.aegix.dev/posts/rust-future.html</guid>
        <pubDate>Sat, 25 Apr 2026 00:00:00 +0000</pubDate>
        <category>Languages</category>
        <description><![CDATA[Exploring memory safety, ownership, and how Rust eliminates entire classes of vulnerabilities.]]></description>
        <media:content url="https://blog.aegix.dev/assets/rust_security_hero_1777315358276.png" medium="image" />
    </item>

    <item>
        <title>Hardening the Software Supply Chain</title>
        <link>https://blog.aegix.dev/posts/supply-chain.html</link>
        <guid isPermaLink="true">https://blog.aegix.dev/posts/supply-chain.html</guid>
        <pubDate>Thu, 23 Apr 2026 00:00:00 +0000</pubDate>
        <category>Research</category>
        <description><![CDATA[A deep dive into securing your CI/CD pipelines and managing third-party dependency risks.]]></description>
        <media:content url="https://blog.aegix.dev/assets/supply_chain_security_1777315341624.png" medium="image" />
    </item>

    <item>
        <title>Beyond the Perimeter: Implementing Zero Trust</title>
        <link>https://blog.aegix.dev/posts/zero-trust.html</link>
        <guid isPermaLink="true">https://blog.aegix.dev/posts/zero-trust.html</guid>
        <pubDate>Tue, 21 Apr 2026 00:00:00 +0000</pubDate>
        <category>Architecture</category>
        <description><![CDATA[Why traditional network security is failing modern distributed teams and how to fix it.]]></description>
        <media:content url="https://blog.aegix.dev/assets/zero_trust_hero_1777315326317.png" medium="image" />
    </item>

    <item>
        <title>The Emerging Landscape of AI-Driven Threats</title>
        <link>https://blog.aegix.dev/posts/ai-threats.html</link>
        <guid isPermaLink="true">https://blog.aegix.dev/posts/ai-threats.html</guid>
        <pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate>
        <category>Research</category>
        <description><![CDATA[How large language models are being leveraged for automated phishing and vulnerability discovery.]]></description>
        <media:content url="https://blog.aegix.dev/assets/ai_threats_hero_v3_1777321659472.png" medium="image" />
    </item>

</channel>
</rss>