Confidential Computing How companies in 2021 can effectively drive machine learning by harnessing their data ecosystems. The proliferation of IoT devices and the shift of many activities to digital has created an over abundance of data, or data ecosystems. These data ecosystems provide a deep level
Confidential Computing Privacy enhancing computation is one of Gartner's top tech trends in 2021 The results are in - Gartner has announced their Top 10 Strategic Technology Trends of 2021 and privacy enhancing computation is on the list. Why does Gartner believe privacy enhancing
News decentriq wins "Startup" category at eco:// award 2020 We are honored to win the "start-up" category at eco:// award 2020, hosted by Eco - Association of the Internet Industry. "This year the internet has shown more than ever how indispensable it is for our society and the world of work in crisis
Webinar [Webinar] Intel, Swiss Re, and decentriq on unlocking the value of private data As companies are becoming more and more data driven, the need for stronger privacy and confidentiality in the cloud has never been greater. Tune in on demand for our webinar co-hosted with Intel and Swiss Re on how companies can unlock the value of
News decentriq partners with Swisscom, Credit Suisse, Mobiliar, PostFinance & the City of Zürich decentriq has been selected to participate in Swiss innovation ecosystem Kickstart's 2020 program and will partner with Swisscom, Credit Suisse, PostFinance, Mobiliar, and the City of Zürich on confidential computing solutions.
News decentriq raises $3.8 million in newest seed funding round decentriq is pleased to announce that we have received a $3.8 million seed funding round co-led by btov Partners and Paladin Capital Group and our existing investor Atlantic Labs. "Getting the most out of existing data assets is a complex, demanding task." says
Data tooling for the next trillion-dollar companies Reports as well as market caps show that being a data driven company is not only paying off, but also that it is slowly and steadily becoming the only option
Academia Membership Inference as a Model Training Metric The question of data privacy in machine learning is still widely overlooked.
Confidential Computing Confidential Computing and GDPR Mergers and acquisitions (M&A) totalled in worth almost $2.49 trillion in the first three quarters of 2019.
Confidential Computing An even deeper dive into the Secure Enclaves In the previous blog we talked about the guarantees that we can provide when a user uses our confidential computing platform avato.
Confidential computing in the telco industry In every country, mobile network operators (telcos) provide the infrastructure for the connectivity of people’s phones and the Internet of Things (IoT).
Confidential Computing The Key to Sensitive Data Analytics is Encrypted in an Enclave At decentriq we aim to solve a simple problem.
Confidential Computing Data Collaboration Made Simple and Safe: Applications in the Health Care Sector People acknowledge the value of data and the benefits of data collaborations.
Academia Closing the circle of security in the cloud Until today, data-sensitive companies are unable to utilize the immense benefits of cloud computing.
A new model for AI governance Over the last centuries, humanity has tested and implemented various governance models for society and individuals. Checks and balances, separation of powers and democracy are ways of making our societies
Why privacy-preserving analytics are crucial for the data economy Today for most organizations it is hard to impossible to benefit from artificial intelligence (AI). Especially, when it comes to training and applying machine learning models because they require substantial
Confidential Computing A cryptographic paradigm shift in data cybersecurity Photo by Jose Fontano on UnsplashAccording to the annual report from the WEF about global risks, increased cyber-threats is one of the biggest risks that companies and countries face right
Brief Introduction to Secure Cryptographic Enclaves Photo by Johannes Plenio on UnsplashWhen Apple released the iPhone 5S in 2013, most people focused on its new camera and features such as Touch ID. However, on top of
The evolution of cryptography (deciphered) Cryptography is the backbone of our current digital society, but how did it become so important? Interestingly, the systematic study of cryptography as a science (and perhaps as an art)
Academia Proving Knowledge of a Hash Pre-Image with ZoKrates In this blog we implement a problem that's very typical in blockchain use-cases: proving the knowledge of a pre-image for a given SHA-256 digest. We will begin demystifying this machinery
Academia Introduction to zk-SNARKs (Part 1) OverviewIn this series of posts, we will look at zero-knowledge proofs (ZKPs): a family of probabilistic protocols, first described by Goldwasser, Micali and Rackoff in 1985, which has garnered increased