April 4, 2019 By Alon Kaufman, CEO, Duality
Duality Named Runner-up at the RSAC Innovation Sandbox Contest

It’s been an exciting journey, from applying for the RSAC Innovation Sandbox Contest, to being shortlisted for the top 10, and eventually being named runner-up, coming in second place ahead of the hundreds of start-ups in this prestigious competition. A surprising nomination? Our nomination as Innovation Leader by a panel of renowned infosec experts undoubtedly …

Read More
November 27, 2018 By Kurt Rohloff
Duality Wins the iDash Competition for Fastest Computations on Genomic Data

We’re very happy to share that Duality Technologies won the iDash competition challenge hosted by UCSD. The iDash competition is an annual international competition that pits the best homomorphic encryption teams against one another to develop the fastest solution for annual genomic computation challenges. The iDash competition is supported by the NIH and Illumina. The …

Read More
May 1, 2018 By Kurt Rohloff
Big Data and Privacy

As we discussed in an earlier blog post, large tech firms have made it their business to commercialize our personal data. This is neither surprising nor revelatory, as user data is the primary asset of these firms. That being said, the recent exposure of the Cambridge Analytica’s use of Facebook data has begun to have …

Read More
March 30, 2018 By Kurt Rohloff
Facebook, Privacy and the Business of Data

Recent revelations from Facebook have highlights again how the business of data puts the privacy of wide populations at risk. Many of the largest and most successful companies, such as Facebook, Google, Amazon and more build highly profitable businesses by deriving insights from our personal information to better sell us products. More efficient sales and …

Read More
January 8, 2018 By Kurt Rohloff
Encrypted Computing as a Protection from Kernel Vulnerabilities

Whenever a running program needs to do anything useful – such as write to a file or open a network connection – it has to temporarily hand control of the processor to the kernel to carry out the job. This mode switching between programs and the kernel are potentially time consuming. In order to be …

Read More