Read this informative and creative take from our friends at Conversational Geek to see how PETs have evolved to revolutionize data sharing and learn how to get started with PETs and incorporate them into your IT processes.
When do you know when to combine different privacy enhancing technologies (PETs) to solve specific problems? Here are a few key questions to ask.
How do you come to be in the Privacy Enhancing Technologies business? What kind of questions do they come to solve? Find out this and more in this sit-down with Dr. Alon Kaufman, CEO and Co-founder of Duality Technologies.
Privacy enhancing technologies can be used together to solve specific business problems that can’t be fully solved by any one technology. Homomorphic encryption is very malleable and works well in combination with other types of privacy enhancing technologies. Homomorphic encryption is often combined with trusted execution environments, federated learning, or multi-party computation. Privacy enhancing technologies can be used together for everything from data analytics to tuning and training models.
Economic sanctions are a hot-button topic recently – and it turns out that privacy enhancing technologies (PETs) can play a role in aiding the fight against this type of financial crime. Watch us interview Duality’s VP Strategy, Ronen Cohen, about where PETs and sanctions collide.
In this Osterman Research supported webinar, Michael Sampson, Senior Analyst at Osterman Research, leads a discussion with Duality’s Vice President of Strategy, Ronen Cohen, and Head of the FFIS, Nick J. Maxwell on how their roles are helping financial institutions navigating the path to successfully leveraging regulations and technology to improve data sharing.
PETs, or privacy enhancing technologies, include any technology that allows sensitive data to be computed on, without revealing the underlying data. Here are 6 essential ones to understand.
Multiple Privacy Enhancing Technologies work together to solve specific business problems that can’t be fully solved by any one technology.