Learn

Blog
Jun 5, 2022 5 mins

How DataCo is Reinventing Data Partnerships by Putting Privacy-Enhancing Technologies…

Think of all the great customer experiences you have ever had! Those unexpected business class upgrades or Netflix “on-the-house” as a part of your cell phone plans....

Read More

Blog
Mar 10, 2022 8 mins

Flying Fuzzy: A Privacy Preserved No-Fly List for Global Airlines…

Since 2020, airlines have been dealing with a rash of irate, disruptive, and violent passengers, resulting in many of those travelers being banned from their future flights....

Read More

Blog
Feb 21, 2022 12 mins

Neuroimaging Based Diagnosis of Alzheimer’s Disease Using Privacy-Preserving Machine Learning…

This second of the three-part blog series describes two privacy-preserving machine learning models (linear and logistic regression) for detecting Alzheimer's disease. The...

Read More

Blog
Dec 21, 2021 12 mins

Neuroimaging Based Diagnosis of Alzheimer’s Disease Using Privacy-Preserving Machine Learning…

In this first of a three-part blog series, we present a viable solution designed by clinical researchers at CHUV and Inpher aiming to build privacy-preserving...

Read More

Blog
Dec 7, 2021 17 mins

Building Privacy-Preserving Decision Tree Models Using Multi-Party Computation

Machine learning (ML) is increasingly important in a wide range of applications, including market forecasting, service personalization, voice and facial recognition,...

Read More

Blog
Feb 26, 2021 7 mins

EU and U.S. Policymakers Emphasize Privacy-Enhancing Technologies as a Shared…

Many consumers use phones and IoT devices that rely on FL every day without knowing what it is. This means that the novelty of FL is shielding scrutiny on its inherent—and...

Read More

Blog
Feb 23, 2021 9 mins

The Privacy Risk Right Under Our Nose in Federated Learning

Many consumers use phones and IoT devices that rely on FL every day without knowing what it is. This means that the novelty of FL is shielding scrutiny on its inherent—and...

Read More

Blog
Oct 20, 2020 7 mins

Better ESG Benchmarking with Secret Computing®

As asset flows continue to pour into environmental, social and governance (ESG) factored investments, the problem of establishing reliable benchmarks continues to persist....

Read More

Blog
Jul 28, 2020 7 mins

A Call to Action: The Regulator’s Role in Supporting Privacy-Enhancing…

Combating financial crimes and protecting privacy are equally critical goals in modern society. Financial crimes, when left undetected, can legitimize illegal profiting from...

Read More

Blog
Feb 7, 2020 3 mins

An Alternative to Big Tech Breakup: Secure, Private Data-Sharing

Is there a good alternative to breaking up Big Tech? Yes, and the solution is secure, private data-sharing. With Secret Computing®, Big Tech companies could securely share...

Read More

Blog
Jul 16, 2019 7 mins

Predictions with Privacy for Patient Data

It has been proven that de-identified data points on anything from credit card transactions to healthcare records can be reidentified, often quickly, by trained data...

Read More

Blog
Mar 18, 2018 3 mins

Securing Autonomous Fleets with Global-Trained Localized Brains

It is possible to train machine learning models with private data sets so that no single data point is identified but statistical learning is maintained, including outliers...

Read More

Blog
Jan 16, 2018 2 mins

The Spectre of Hardware Security Looming over Intel SGX

As the fallout of the Spectre and Meltdown vulnerabilities settles, the future of in-silica security becomes fuzzier. There are many comprehensive reports on the attack...

Read More

Blog
May 23, 2017 1 min

US Senator Encourages Use of ‘Privacy Enhancing Technologies’

In a letter to the Commission on Evidence-Based Policymaking, US Senator Ron Wyden, D-Ore. proposed the use of privacy enhancing technologies (PETs) by government agencies in...

Read More

Blog
Feb 8, 2017 2 mins

Banking on [Digital] Trust

Trust cements the foundation of the banking industry. Without it, we would be more apt to keep cash stuffed under our mattresses than in the impenetrable vault of a...

Read More

1 2