Remove Authentication Remove Internet Remove Social Remove Technology
article thumbnail

Capsule gets $1.5M to build ‘super simple’ decentralized social media

TechCrunch

” Cryptocat author gets insanely fast backing to build P2P tech for social media. Given the intent with TIC is to hosts all sorts of decentralized apps it’s possible — indeed, likely — that a bunch of decentralized social media plays will emerge. Polychain Capital outted its Beacon Fund last September.

Media 246
article thumbnail

3 Cybersecurity Technologies You Should Know

The Crazy Programmer

To keep your systems secure and your files out of the hands of cybercriminals takes an increasingly comprehensive knowledge of cybersecurity technology. Existing tools and technologies are insufficient to completely thwart hackers. When you use a VPN to access the internet, all of your browsing data is routed through the VPN server.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Fixed wireless access is a type of 5G or 4G LTE wireless technology that enables fixed broadband access using radio frequencies instead of cables.

Wireless 230
article thumbnail

Kenyan startup Wowzi secures $3.2 million from 4DX Ventures, Andela co-founder to expand across Africa

TechCrunch

Kenyan startup Wowzi has secured new funding to expand the reach of its platform, which turns social media users into brand influencers, to West and Southern Africa — as it taps the increasing usage of social sites across the continent driven by the proliferation of smartphones and a deepening internet penetration.

Media 250
article thumbnail

What you need to know about Okta’s security breach

CIO

Identity attacks use social engineering, prompt-bombing, bribing employees for 2FA codes, and session hijacking (among many techniques) to get privileged access. A DLP-like technology can be effective in preventing users from uploading files with sensitive data unknowingly.

article thumbnail

China’s draft measures demand ‘individual approval’ for facial recognition use

TechCrunch

The pervasive use of facial recognition technology across all facets of life in China has elicited both praise for its convenience and backlash around privacy concerns. Now the industry is facing some potentially significant changes as Beijing steps up efforts to establish more defined boundaries for the technology’s usage.

Hotels 200
article thumbnail

Identity security platform Oort bags new cash to grow its product

TechCrunch

Joined by Didi Dotan, the former chief architect of identity at EMC and director of identity services at Cisco, Caulfield set out to launch a service that could detect and respond to identity threats — e.g. social engineering, phishing and malware — at “enterprise scale.” VC firms poured $2.3 Israel and Uruguay.