Sector

Cybersecurity

Filter
Filter
Category
All Categories
Location
All Locations
Country
All Countries
Reset all
Nex Gen. Biometric authentication
Spotlight
In an era where personal information is no longer private and passwords are commonly reused, stolen or cracked, the traditional method of protecting access to data and services by username and password has repeatedly proven to be inadequate. Keyless is a team of scientists and entrepreneurs pioneering a solution to this large-scale structural issue of the internet. The Keyless team have built a novel biometric authentication platform that eliminates the need for businesses to store and manage passwords, biometric data, cryptographic keys and other sensitive personal information, without compromising on convenience and privacy for their employees or end-users. We’re pumped to watch the Keyless team build the future of authentication.
Keyless
Platforms, / Europe, England / Seed
Keyless
Nex Gen. Biometric authentication
Platforms
Europe
England
Seed
Confidential computing for secure code and data.
Spotlight
Edgeless Systems is building an open-source framework to enable secure communications for the next generation of confidential computing. Confidential computing is a cloud computing technology that isolates sensitive data in encrypted and verifiable CPU enclaves (i.e. hardware) during processing. The contents of the enclave, including the data being processed and the techniques used to process it, are accessible only to authorised programming code, remaining invisible to anything or anyone else, including cloud providers.
Edgeless Systems
Platforms, / Europe, Germany / Pre-seed
Edgeless Systems
Confidential computing for secure code and data.
Platforms
Europe
Germany
Pre-seed
Protocol to incentivise white-hat hackers to report vulnerabilities in smart contracts.
Spotlight
Hats.finance is a proactive bounty protocol for white hat hackers and auditors, where projects, community members, and stakeholders incentivise protocol security and responsible disclosure. Hats create scalable vaults using the project’s own token. The value of the bounty increases with the success of the token and project. In addition, prolific NFT artists have pledged assistance and will create numerous unique NFTs that will be minted specially for hackers and auditors that responsibly disclose vulnerabilities.
Hats Finance
Platforms, / Asia, Israel / Pre-seed
Hats Finance
Protocol to incentivise white-hat hackers to report vulnerabilities in smart contracts.
Platforms
Asia
Israel
Pre-seed
Not results found
Sorry, we couldn’t find any companies for your search.
Reset Filter