• Platform
    • Platform Overview

      Secure data collaboration and analysis

      Learn More
    • Duality ML

      Secure analytics & machine learning

    • Open Source

      Production-ready post-quantum FHE library

    • Duality Query

      Encrypted queries on Secured Datasets

  • Solutions
    • Financial Services Industry
      • Financial Services Overview

        Complete picture of risk, transactions, and clientele

        Learn More
      • Fraud Prevention

        An industry-wide approach to fight fraud

      • Anti-Money Laundering

        Data collaboration to fight money laundering

      • Trade Financing

        Collaborate to mitigate trade finance fraud

    • Healthcare Industry
      • Healthcare Overview

        Fuel research, discovery, and better patient outcomes

        Learn More
      • GWAS

        Boost data volume and variety with secure collaboration

      • Real World Evidence

        Accelerate multi-center studies while ensuring privacy

    • Government Industry
      • Government Overview

        Institute privacy preserving data collaborations

        Learn More
      • Secure Investigations

        Accelerate Secure Government Investigations

    • Marketing
      • Marketing Overview

        Optimize Your Advertising and Customer Retention

      • Targeted Offers

        Leverage customer data to optimize advertising with privacy

  • Partners
    • Duality Collaboration Hub

      Empower your partners and customers with secure data collaboration

      Learn More
    • AWS
    • Google
    • Azure
    • Deloitte
    • Oracle
    • Intel
    • IBM
    • DARPA
  • Resources
    • Blog
    • Resource Hub
    • Videos
    • Documentation
  • Company
    • About Duality
    • Events
    • Careers
    • News
    • Contact Us
  • Book a Demo
  • Try Now

    May 26th, 2022 by Tova Dvorin

    Posted in Post, Privacy, Security

    Tags: Big Data, Data, encryption technologies, Privacy

    Data Privacy: A Runbook for Engineers

    The following is an interview with Nishant Bhajaria, privacy author and Director of Data Privacy Engineering at Uber. Answers have been edited slightly for clarity.  Kurt Rohloff, CTO of Duality: Would you just maybe say a few words about yourself, your background and what you’re trying to achieve in your book, Data Privacy: A Runbook...

    January 8th, 2018 by Kurt Rohloff

    Posted in Security

    Tags: computing on encrypted data, encrypted computing technology, Kernel Vulnerabilities, Meltdown, Meltdown breaks security

    Encrypted Computing as a Protection from Kernel Vulnerabilities

    Whenever a running program needs to do anything useful – such as write to a file or open a network connection – it has to temporarily hand control of the processor to the kernel to carry out the job. This mode switching between programs and the kernel are potentially time consuming. In order to be...

    November 14th, 2017 by Kurt Rohloff

    Posted in Cloud Computing, Privacy, Security

    Tags: Homomorphic encryption

    Homomorphic Encryption Standardization

    In addition to becoming widely used in practice, homomorphic encryption is also in the process of being standardized.  Duality Technologies has been a leader in this effort, but we’ve had many brand-name partners in the effort who all see it in their interest to use standardized homomorphic encryption technologies, like the open-source PALISADE technologies that...
  • Col 1
    • About Duality
    • Company
    • Careers
    • Product
    • Platform Overview
    • Query Engine
    • Machine Learning and Analytics
  • Col 2
    • Industry Solutions
    • Financial Services
    • Healthcare
    • Government
    • News
    • Events
    • Blog
  • Col 3
    • Partners
    • Collaboration Hub
    • Intel
    • Oracle
    • IBM
    • Google
    • Contact Us
Subscribe to our monthly newsletter
All rights reserved to © Duality 2023
  • Privacy Policy
  • Terms of Service
  • Cookie Policy