article thumbnail

Passwordless authentication startup Descope lands whopping $53M seed round

TechCrunch

Take Descope , for example, which today announced that it raised a whopping $53 million in seed funding for its “developer-first” authentication and user management platform. Capital might be harder to come by than it once was in startup land, but some firms are bucking the trend — hard. So why launch Descope now?

article thumbnail

Authentic leadership: Building an organization that thrives

CIO

Leadership styles have traditionally centered their focus on profits, share prices, and productivity, but a new approach increasingly taken up by today’s leaders, known as “authentic leadership,” takes a different spin on the concept. But ultimately, authentic leadership can be viewed as the opposite of traditional leadership in many ways.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

Security researchers are warning of a significant global rise in Chinese cyber espionage activity against organizations in every industry. Researchers at the firm also identified seven new Chinese-origin cyber espionage groups in 2024, many of which exhibited specialized targeting and toolsets.

Industry 198
article thumbnail

Overcoming the 6 barriers to IT modernization

CIO

For example, a financial services firm adopted a zero trust security model to ensure that every access request is authenticated and authorized. Learn more about IDC’s research for technology leaders OR subscribe today to receive industry-leading research directly to your inbox. Contact us today to learn more.

article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

When voice deepfakes come calling

CIO

And if they werent, multi-factor authentication (MFA), answers to security questions, and verbal passwords would solve the issue. Navigating IVR According to an analysis of call center deepfake attacks, a primary method favored by fraudsters is using voice deepfakes to successfully move through IVR-based authentication.

article thumbnail

Cybersecurity Snapshot: AI Security Roundup: Best Practices, Research and Insights

Tenable

Harden configurations : Follow best practices for the deployment environment, such as using hardened containers for running ML models; applying allowlists on firewalls; encrypting sensitive AI data; and employing strong authentication.