LinkedIn gives up on Stories

LinkedIn is shutting down its ephemeral Stories product, the company announced Tuesday. The company plans to “remove the current Stories experience by the end of September,” according to Liz Li, senior director of product. The Snapchat-style video Stories were first launched in February 2020 in internal testing.

Part of the reason for the shutdown is that LinkedIn learned users just didn’t want disappearing video. “In developing Stories, we assumed people wouldn’t want informal videos attached to their profile, and that ephemerality would reduce barriers that people feel about posting,” Li said. “Turns out, you want to create lasting videos that tell your professional story in a more personal way and that showcase both your personality and expertise.”

LinkedIn’s move follows Twitter’s shutdown of Fleets

LinkedIn’s move follows Twitter’s shutdown of Fleets, its Stories-like product, in July. Like LinkedIn, Twitter observed that users didn’t respond to ephemeral video in the way it had wanted. “We hoped Fleets would help more people feel comfortable joining the conversation on Twitter,” Ilya Brown, Twitter’s vice president of product, said on Twitter’s blog. “But, in the time since we introduced Fleets to everyone, we haven’t seen an increase in the number of new people joining the conversation with Fleets like we hoped.”

The two shutdowns could signal a broader pullback from ephemeral video products among social media companies. However, it seems unlikely that Snapchat or Instagram will be giving up on their Stories products anytime soon.

Now we just have to wait and see which social media companies step back from their Clubhouse clones. If you were wondering, yes, LinkedIn is working on one of those.

Hot this week

The Hidden Dangers of Over Reliance on Security Tools

Adding more security tools can increase complexity and blind spots instead of improving protection, so focus on integration and training over new purchases.

How Poor MFA Setup Increases Your Attack Surface

Multi-factor authentication is essential for security, but flawed implementation can expose your organization to greater risks than having no MFA at all. Learn how to properly configure MFA to avoid common pitfalls and strengthen your defenses.

The Blind Spots in Your Vulnerability Management Program

Automated vulnerability scanning often creates dangerous blind spots by missing nuanced threats that require human analysis, leading to false confidence in security postures.

Multi Factor Authentication Myths That Put Your Data at Risk

Multi-factor authentication creates a false sense of security when implemented without understanding its vulnerabilities, particularly in global contexts where method choices matter more than checkbox compliance.

The Overlooked Flaws in Multi Factor Authentication

Multi factor authentication is often presented as a security panacea, but hidden flaws and implementation gaps can leave organizations vulnerable despite compliance checkboxes.

Topics

The Hidden Dangers of Over Reliance on Security Tools

Adding more security tools can increase complexity and blind spots instead of improving protection, so focus on integration and training over new purchases.

How Poor MFA Setup Increases Your Attack Surface

Multi-factor authentication is essential for security, but flawed implementation can expose your organization to greater risks than having no MFA at all. Learn how to properly configure MFA to avoid common pitfalls and strengthen your defenses.

The Blind Spots in Your Vulnerability Management Program

Automated vulnerability scanning often creates dangerous blind spots by missing nuanced threats that require human analysis, leading to false confidence in security postures.

Multi Factor Authentication Myths That Put Your Data at Risk

Multi-factor authentication creates a false sense of security when implemented without understanding its vulnerabilities, particularly in global contexts where method choices matter more than checkbox compliance.

The Overlooked Flaws in Multi Factor Authentication

Multi factor authentication is often presented as a security panacea, but hidden flaws and implementation gaps can leave organizations vulnerable despite compliance checkboxes.

The Hidden Costs of Security Compliance

Compliance frameworks often create security blind spots by prioritizing checkbox exercises over real threat mitigation, leading to breaches despite passing audits.

The Illusion of AI in Cybersecurity

AI security tools often create alert fatigue instead of protection, but focusing on human oversight and measured deployment can turn them into effective assets.

The Overlooked Risk of Shadow IT

Shadow IT poses a greater risk than many external threats by bypassing security controls, and managing it effectively requires understanding employee needs rather than simply blocking unauthorized tools.
spot_img

Related Articles

Popular Categories