How to Use Homomorphic Encryption in the Real World
A closer look at HE use cases and how to use homomorphic encryption in a privacy-preserving manner.
Anomaly Detection: K-Nearest Neighbors
In this blog, we will discuss K-nearest neighbors (KNN), a common technique in anomaly detection. We will then provide an overview of where it intersects with emerging privacy preserving technologies and how it impacts advanced analysis on multiple encrypted datasets.
Benefits of Open-Source Software and Standardization in Homomorphic Encryption
How can users trust that the open-source libraries they are using work as expected? How do we know that these libraries are safe?
What is Synthetic Data and When Should it be Used?
All about Synthetic Data – advantages, disadvantages, and real-world use cases.
How to Choose a Homomorphic Encryption Library
Criteria to consider when choosing an open-source homomorphic encryption library, and a review of libraries available in 2022.
CISO to CISO: The Next Encryption Frontier – Business Enabler
The best CISOs are more than just risk & control people; they are true business enablers. So are PETs.