IAB Tech Lab proposal OPJA sets a high standard for security in clean room interoperability
What is OPJA, why does standardization in retargeting matter for clean room users, and what role do Privacy-Enhancing Technologies (PETs) play? This article covers the basics of the IAB Tech Lab's new proposed standard for clean room interoperability.

What the SolarWinds data breach means for companies going forward
In December 2020, SolarWinds, Inc., a leading provider of network performance monitoring tools, suffered attack from a SUNSPOT malware. It hit not just SolarWinds, but also its clients, including US government agencies and Fortune 500 companies, leaving valuable data assets exposed and compromised.

Privacy enhancing computation is one of Gartner's top tech trends in 2021
"This trend enables organizations to collaborate on research securely across regions and with competitors without sacrificing confidentiality. This approach is designed specifically for the increasing need to share data while maintaining privacy or security."

Data tooling for the next trillion-dollar companies
Reports and market caps show that being a data-driven company is not only paying off, but also that it is becoming the only option to navigate the data producing economy we live in. Companies understand this, so they rush to update their business models to become “data-driven” or “data-first”.

Membership Inference as a Model Training Metric
The question of data privacy in machine learning is still widely overlooked. In this blog, we propose a new machine learning training metric that greatly reduces the risk of data reidentification. It can be embedded in any model training with minimal cost.

Confidential Computing and GDPR
Mergers and acquisitions (M&A) totalled in worth almost $2.49 trillion in the first three quarters of 2019. Some prominent examples are Saudi Aramco/Saudi Basic Industries Corporation, AbbVie/Allergan, Bristol-Myers Squibb/Celgene, and United Technologies/Raytheon.

Data Collaboration Made Simple and Safe: Applications in the Health Care Sector
People acknowledge the value of data and the benefits of data collaborations. Yet, concerns about data privacy and security are increasing. To solve these challenges, the leaders in the field of confidential computing establish new technologies to make data collaborations simple and safe.

Closing the circle of security in the cloud
Until today, data-sensitive companies are unable to utilize the immense benefits of cloud computing. Confidential Computing is here to change this. It is well known that cloud-computing offers many advantages, from increased scalability to reduced operations costs.

Efficient ECC in zkSNARKs using ZoKrates
Elliptic Curve Cryptography (ECC) is a powerful tool that has many applications in the blockchain space and cryptography in general. With one of the last releases, we added support for efficient ECC-based cryptographic primitives inside a zkSNARK construction.

A new model for AI governance
Over the last centuries, humanity has tested various governance models for society and individuals. Checks and balances, separation of powers and democracy to be governed as fair as possible. It’s about not giving too much power to a single entity by having proper governance methods in place.

Why privacy-preserving analytics are crucial for the data economy
Today for most organizations it is hard to impossible to benefit from artificial intelligence (AI). Especially, when it comes to training and applying machine learning models because they require substantial investments of money, time, data and expertise.

A cryptographic paradigm shift in data cybersecurity
According to the annual WEF report on global risks, increased cyber-threats is one of the biggest risks that companies and countries face right now. One of the most common is data breach where attackers target the database of the company in order to get access to customer data.

Brief Introduction to Secure Enclaves
We previously wrote about the importance of encryption in-use and why it is harder then "standard" encryption. In this article we introduce the concept of a Secure Enclave, that deals with a lot of the headaches that come with operating on encrypted data.
