Learn

A Call to Action: The Regulator’s Role in Supporting Privacy-Enhancing…
Combating financial crimes and protecting privacy are equally critical goals in modern society. Financial crimes, when left undetected, can legitimize illegal profiting from...

An Alternative to Big Tech Breakup: Secure, Private Data-Sharing
Is there a good alternative to breaking up Big Tech? Yes, and the solution is secure, private data-sharing. With Secret Computing®, Big Tech companies could securely share...

Predictions with Privacy for Patient Data
It has been proven that de-identified data points on anything from credit card transactions to healthcare records can be reidentified, often quickly, by trained data...

Securing Autonomous Fleets with Global-Trained Localized Brains
It is possible to train machine learning models with private data sets so that no single data point is identified but statistical learning is maintained, including outliers...

The Spectre of Hardware Security Looming over Intel SGX
As the fallout of the Spectre and Meltdown vulnerabilities settles, the future of in-silica security becomes fuzzier. There are many comprehensive reports on the attack...

US Senator Encourages Use of ‘Privacy Enhancing Technologies’
In a letter to the Commission on Evidence-Based Policymaking, US Senator Ron Wyden, D-Ore. proposed the use of privacy enhancing technologies (PETs) by government agencies in...

Banking on [Digital] Trust
Trust cements the foundation of the banking industry. Without it, we would be more apt to keep cash stuffed under our mattresses than in the impenetrable vault of a...

Behavioral Futures and Surveillance Capitalism
The inevitable onslaught of targeted advertisements has both consumers and technology companies wondering whether there is any alternative future for internet economics. ...

Confusion in China’s Cyber Laws
The latest in a wave of sovereign data security laws has emerged from China, causing some alarm with companies trying to understand how it could impact their businesses. ...

Cloud Security by the Numbers
With over 3,000 IT professionals surveyed, the recent Ponemon study sponsored by Gemalto addressed issues concerning the "Global State of Cloud Data Security." The webcast...

Open Camps Conference at UN
The world's largest mission-driven open source conference, Open Camps aims to "break down barriers to technology innovation through open source governance, communities and...

Gone, Not Forgotten.
Strong privacy laws that establish the 'right to be forgotten' may be unenforceable. EU citizens can request that search engines remove results that are no longer relevant...

[Secure] Sharing is Caring
Keyword search is enabled on shared data by utilizing a key exchange system based on standard public and secret key cryptography. The _ultra encrypted key architecture allows...

Rethinking IoT Security
With over 20 billion devices coming online by 2020 and an estimated 25 vulnerabilities per product, it's no wonder that IoT security is a hot topic. While acknowledging that...

Safe Harbor 2.0 and the reaction of cyber imperialists
Mr. Schrems has his doubts about 'Safe Harbor 2.0', according to his recent interview with Ars Technica. Others have been quick to jump on board with dissent, eyeing...