Remove Authentication Remove CTO Remove Software Development
article thumbnail

Ex-Plaid employees raise $30M for Stytch, an API-first passwordless authentication platform

TechCrunch

One such company, Stytch , just raised $30 million in a Series A round of funding as it launches out of beta with its API-first passwordless authentication platform. Lamb says that as she and McGinley-Stempel worked together at Plaid on user authentication, they realized how frustrating it is to build sign-up and login flows. “In

article thumbnail

Digital transformation 2025: What’s in, what’s out

CIO

2025 will be the year when generative AI needs to generate value, says Louis Landry, CTO at Teradata. Whats in is self-funding AI-led business reinvention by slashing technology, data, and process debt and adopting AIOps and AI-enabled software development, says Amit Bajaj, North America president of TCS.

article thumbnail

Startup CTO or Developer

SoCal CTO

I’ve been having discussions with several people recently about the role of the CTO (Chief Technology Officer) in very early stage companies. In December 2007, I described how I commonly take on an Acting CTO Role in a Start-up. That’s why Roger Smith puts the focus of the CTO on programming for the earliest stage.

CTO 90
article thumbnail

Piramal CTO Saurabh Mittal on financial services innovation

CIO

The 36,000-square-foot innovation hub will be led by the company’s CTO, Saurabh Mittal, and Markandey Upadhyay, head of business intelligence unit for Piramal. CIO.com caught up with Mittal to know more about his plans for the innovation lab, as well as the technology strategy for the financial services company.

article thumbnail

Otterize raises $11.5M to help developers securely connect software services

TechCrunch

Tomer Greenwald, Uri Sarid and Ori Shoshan, software developers by trade, found themselves building and configuring software authentication and authorization mechanisms repeatedly — each time with a different tech stack. Otterize today raised $11.5

Software 211
article thumbnail

‘Memsad’ software rot threatens to leak your digital secrets

The Parallax

At the Chaos Communication Congress in December , and then again on March 19 here at the CanSecWest conference, van Sprundel named a particular case of code rot—one that essentially enables hackers to pluck mission-critical digital secrets directly from the software—memsad, a pun on the “memset” function to clear memory.

article thumbnail

Chainguard raises $50M to guard supply chains

TechCrunch

These images will be fully signed and will feature a software bill of materials (SBOM). “Security engineers are used to reasoning with roots of trust by using two-factor authentication and identification systems and establishing trust with hardware by using encryption keys.