Resource Hub

Filter by Topics
Filter by Category
Filter by Topics
More
Filter by Category
More
Blog
A closer look at HE use cases and how to use homomorphic encryption in a privacy-preserving manner.
Data PrivacyHomomorphic EncryptionPrivacy Enhancing Technologies (PETs)
Saroja Erabelli | August 17, 2022
eBook
Duality's e-guide to common terminologies and acronyms in the privacy landscape, including terms ...
Data PrivacyFinancialHealthcarePrivacy Enhancing Technologies (PETs)
Duality | August 2022
Video
Duality's Chief Business Officer, Michael Hughes, discusses key RegTech trends, operational risks...
AMLCISOCross-BorderCyber CrimeData PrivacyFinancialFraudHomomorphic EncryptionPrivacy Enhancing Technologies (PETs)
Duality | September 22, 2022
Video
Jim McGough, Co-Founder and Director at EdgeOne Medical, and Michael Hughes, Chief Business Offic...
Data PrivacyHealthcareHomomorphic EncryptionPrivacy Enhancing Technologies (PETs)
Duality | September 1, 2022
Video
Recently, Professor Shafi Goldwasser, a co-founder of Duality Technologies, a Turing award and tw...
Cyber CrimeData PrivacyGDPRHomomorphic EncryptionPrivacy Enhancing Technologies (PETs)
Duality | August 4, 2022
Blog
In this blog, we will discuss K-nearest neighbors (KNN), a common technique in anomaly detection....
Data PrivacyHomomorphic Encryption
Oded Rosolio | August 2, 2022
Blog
How can users trust that the open-source libraries they are using work as expected? How do we kno...
Homomorphic Encryption
Yuriy Polyakov | July 29, 2022
Blog
All about Synthetic Data - advantages, disadvantages, and real-world use cases.
Privacy Enhancing Technologies (PETs)
Jeffrey Dobin | July 28, 2022
Blog
Criteria to consider when choosing an open-source homomorphic encryption library, and a review of...
Homomorphic EncryptionPrivacy Enhancing Technologies (PETs)
Ian Quah | July 27, 2022
Brief
Data has three basic states: at rest, in transit, and in use. Homomorphic Encryption allows compu...
Homomorphic EncryptionPrivacy Enhancing Technologies (PETs)
Duality Team | July 2022
Blog
The best CISOs are more than just risk & control people; they are true business enablers. So ...
CISOHomomorphic Encryption
Charles Blauner | June 23, 2022
Blog
The answer to the privacy/AI conflict is privacy-preserving machine learning (PPML) – a step-by-s...
Data PrivacyPrivacy Enhancing Technologies (PETs)
Dr. Marcelo Blatt | June 2, 2022
Article
75% of all people will be covered by data privacy regulations by 2024, enterprises must ensure th...
Cyber CrimeData PrivacyGDPRHealthcare
World Economic Forum | August 15, 2022
Article
The USA PATRIOT Act Section 314(b) is an important enabler in the fight against financial crime, ...
AMLData PrivacyFinancialFraud
CPO Magazine | August 10, 2022
Brief
Today's data driven enterprise must harness the power of data and realize its value. However, in ...
AMLCross-BorderCyber CrimeData PrivacyFinancialFraudGDPRHealthcarePrivacy Enhancing Technologies (PETs)Telecommunications
Duality Team | July 2022
Video
Jules Polonetsky is the CEO of The Future of Privacy Forum (FPF), a think tank based in Washingto...
Cyber CrimeData PrivacyGDPRHomomorphic EncryptionPrivacy Enhancing Technologies (PETs)
Duality | June 29, 2022
Video
As the way we use data has evolved, so has the role of the CISO. In this interview, Charles Blaun...
CISOData PrivacyPrivacy Enhancing Technologies (PETs)
Duality | June 23, 2022
Infographic
Trade financing is an essential part of business trade and the international economy. When misuse...
Fraud
Duality Team | June 2022
eBook
Read this informative and creative take from our friends at Conversational Geek to see how PETs h...
Data PrivacyFinancialHealthcarePrivacy Enhancing Technologies (PETs)
Conversational Geek | June 2022
Video
Two Duality Technologies co-founders, Rina Shainski and Shafi Goldwasser, recently met to discuss...
CryptographyData PrivacyPrivacy Enhancing Technologies (PETs)
Duality | June 8, 2022

Experience secure collaborative computing today. 

Maximize the value of sensitive, regulated, or confidential data.

Experience secure collaborative computing today.

Maximize the value of sensitive, regulated, or confidential data.