Passwordless authentication startup SecureW2 raises $80M from Insight Partners

Passwordless authentication startup SecureW2 ...

Up next

South Korea’s LetinAR is building optics behind AI glasses; plus, Marketing operating system Nectar Social raises $30M Series A led by Menlo

A lens the size of a thumbnail — and the South Korean startup that makes it could become the optical backbone of the AI glasses era. Also, AI-powered marketing platform Nectar Social announced Thursday that it raised a $30 million Series A round led by Menlo Ventures and its Anth ...  Show more

Lovable just backed a company that’s looking to bring vibe coding to hardware; plus, Meridian Ventures launched $35M fund to back MBA-deferred founders

Hardware company Atech raised $800,000 in pre-seed funding, including from a16z’s scout fund, Sequoia Scout Fund, and Nordic Makers. Plus, Meridian Ventures, the venture firm founded by Devon Gethers and Karlton Haney, announced on Friday the raise of a $35 million second fund to ...  Show more

Recommended Episodes

Is Your Password Secure? Probably Not
CYBER

For decades, experts have known that a simple alphanumeric password isn't enough to secure our identities online, but nothing has changed. In this episode, we’re talking to Wendy Nather, a veteran of the infosec world who knows a thing or two about identity and authentication. Ho ...  Show more

brute-force attack (noun) [Word Notes]
Hacking Humans

A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered. 

Fingerprint authentication is not completely secure. [Research Saturday]
CyberWire Daily

Passwords are the traditional authentication methods for computers and networks. But passwords can be stolen. Biometric authentication seems the perfect solution for that problem. Our guest today is Craig Williams, director of Talos outreach at Cisco. He'll be discussing and prov ...  Show more

Episode 10: Exploiting Authenticated Encryption Key Commitment!
Cryptography FM

Authenticated encryption such as AES-GCM or ChaCha20-Poly1305 is used in a wide variety of applications, including potentially in settings for which it was not originally designed. A question given relatively little attention is whether an authenticated encryption scheme guarante ...  Show more