Skip to main content

Business (2)

Financial crime detection – technology and collaboration in modern compliance

Financial crime detection is no longer about ticking compliance boxes. The challenge has shifted from reporting suspicious transactions to proactively identifying risk before it becomes loss.

DORA and the European Banking Authority (EBA)

DORA and the EBA – who sets and enforces resilience rules

The Digital Operational Resilience Act (DORA) introduces a single, harmonized framework for how financial institutions in the European Union manage digital risk. At the center of this framework sits the European Banking Authority (EBA), which plays a pivotal role in defining, implementing, and ...

Traceability in the supply chain: Building trust and transparency from source to shelf

Production is happening all over the world. Consumers are more aware of what they’re buying. Two reasons why supply chain traceability has become the new standard. Doesn’t matter if it's a luxury good, a pharmaceutical shipment, or a grocery item, people want to know where products come from, how ...

Interoperability explained: The key to smarter, connected systems

Ever wondered what makes systems work together seamlessly? Interoperability is the answer. Data is everywhere, but it rarely speaks the same language across platforms. That’s why interoperability is the quiet hero behind the scenes, turning chaos into clarity.

Two professionals analyzing financial data on a tablet and laptop, discussing fintech solutions for trading and investment.

Fintech's future is private: how privacy-enhancing technologies are reshaping finance

The financial technology (fintech) sector is driving disruption, constantly pushing the boundaries of banking, insurance, and payments. But increasing digitization also means data is being shared more than ever, raising new concerns around cyber threats, compliance, and consumer trust.

Two financial professionals reviewing data at a computer, representing security in finance through careful monitoring and risk management.

Security in finance: Protecting data in a digital age

Financial institutions are responsible for protecting some of the most sensitive data imaginable: bank account numbers, transaction histories, investment portfolios, and personal identification details.

Whitepaper: Secure Multi-party Computation goes live

Read the official whitepaper that reports on the first large-scale and practical application of Secure Multi-Party Computation, which took place in January 2008.

Delivery worker using a tablet to manage packages, supporting product traceability in the supply chain.

Why product traceability is the backbone of secure and transparent supply chains

Being able to prove a product’s origin story and verify how it was stored and transported turns messy supply chains into transparent, trusted ecosystems. But most systems are still stuck in the digital Stone Age.

Worker using tablet and scanner in warehouse, demonstrating asset tracking software in use.

Asset tracking software: How supply chains stay efficient, compliant, and connected

Asset tracking software has become mission-critical for modern supply chains. From real-time visibility to regulatory compliance, it empowers companies to manage goods, tools, and materials with speed and precision across borders, systems, and partners.

Lab technician analyzing samples with a microscope connected to a laptop, demonstrating the use of health tech in medical diagnostics.

Health tech: How technology is reshaping modern healthcare

Health tech is changing the way healthcare systems operate, quietly improving the tools, workflows, and decisions behind patient care.

Revolutionize your Supply Chain for strategic advantage with Digital Product Passports - the journey of trust

The great paradox: How to innovate with AI while keeping data safe

In today's world, where almost everything is driven by data, Artificial Intelligence (AI) is the engine of progress. From revolutionizing healthcare to powering smart cities, AI demands vast amounts of data to learn and evolve. Yet, this hunger for data often clashes with an equally critical ...

Warehouse workers organizing and transporting boxes between tall shelves stocked with goods and containers

Non-fungible token (NFT) meaning: What it is and how it’s transforming supply chains

NFTs, or non-fungible tokens, are often associated with digital art and collectibles. But in today’s complex global supply chains, their real power lies in authenticating physical goods, proving provenance, and building transparency into every step of a product’s journey.

Danish Researchers and Companies partners to Quantum-Secure Future Cybersecurity

Researchers and Companies partners to Quantum-Secure Cybersecurity

Innovation Fund Denmark is investing DKK 25.9 million in a new groundbreaking quantum technology project, designed to develop world-leading technology in future-proof data protection.

Revolutionize your Supply Chain for strategic advantage with Digital Product Passports - the journey of trust

Revolutionize Supply Chain for advantage with Digital Product Passport

For too long, the journey of products from their origin to your customer's hands has been either non-existing or mired in paperwork, fragmented data, and lingering doubts about trust.

Scientist using a microscope in a lab, highlighting data security in healthcare research

Data security in healthcare: Protect patient privacy in a digital age

In healthcare, data saves lives, but it needs to be protected. As hospitals, clinics, and research institutions digitize operations, data security in healthcare has become one of the industry’s most urgent challenges.

person using a mobile device to scan digital product passport using a QR code

Digital product passport: Smart and secure supply chain compliance

Ever wondered what your products would say if they could talk? A digital product passport gives every item a voice: a transparent, tamper-proof record of its origin, materials, and journey through the supply chain. From how it was made to how it can be reused or recycled, it’s all there in one ...

persons working in pharma tech

Pharma tech: How technology is reshaping the pharmaceutical industry

A new type of medicine can save lives but getting it from lab to patient has never been more complex. Pharma tech is rewriting the rules of drug development, using tools like AI, blockchain, and secure computing to accelerate breakthroughs and streamline once-siloed processes.

person working with health information tech

Health information tech: How digital innovation is transforming care

In hospitals, clinics, and labs around the world, a quiet revolution is reshaping the way healthcare operates. Health information technology (health information tech) is no longer just about digitizing patient records, it’s about using data smarter, faster, and more securely to improve outcomes and ...

The Confidential Computing Consortium text and an icon from it

Pioneering with industry leaders: Confidential Computing Consortium

As part of our mission to shape a future where sensitive data can be used without ever being exposed, we’re proud to be a partner in the Confidential Computing Consortium, joining global tech leaders to define the standards and technologies that make secure data collaboration possible.

DORA RTS – regulatory technical standards

DORA RTS – regulatory technical standards

The Digital Operational Resilience Act (DORA) is a broad regulation, but its impact becomes real through the Regulatory Technical Standards, often referred to as RTS. These technical standards define exactly how financial institutions must comply. They move DORA from principle to practice, spelling ...

people collaborating on data

Data collaboration: How to unlock shared value without compromising privacy

When organizations collaborate on data, they gain new insights, better outcomes, and a competitive edge. From medical research to fraud detection and supply chain optimization, data collaboration drives smarter decision-making. But it also introduces a hard truth: the more data you share, the more ...

people around a table discussing data privacy

The ultimate guide to data privacy

Every interaction, transaction, and login leaves a data trail. The question is whether that trail leads to trust or to trouble.

two persons talking about cybersecurity

Cybersecurity - Complete guide to protecting data, systems and people

A single click can shut down a hospital. One weak password can cost millions. And a routine-looking email can be the front door to a system-wide breach.

person protecting systems against data leaks

Data leak protection: How to keep sensitive information from slipping through the cracks

A single data leak can bring down years of hard-earned trust, cost millions in fines, and open the door to reputational damage that's hard to recover from. And while high-profile breaches make headlines, everyday leaks often happen quietly - through misconfigured settings, insider mistakes, or ...

person showing a data sharing agreement

Data sharing agreement: Why it matters, and how to get it right

When two or more organizations work together, data often moves with them: Between systems, across teams, and sometimes across borders. But without clear guardrails in place, that movement can create risk, confusion, or even legal exposure.

Partisia and Trust Stamp partner to make digital IDs safer and more private by securely linking them to unique biometrics

15 May 2025 – In a major step toward strengthening digital security and privacy, two deep tech companies, Partisia and Trust Stamp, have formed a strategic partnership to develop a more accessible and resilient solution for biometric holder binding. This partnership will deliver a foundational ...

People working together to create privacy by design solutions

Privacy by design: Definition, principles, and benefits

Data drives decisions, and to collect data, you need to think about privacy and build trust. That’s where privacy by design comes in: a proactive approach that embeds privacy into the very foundation of systems and processes.

Privacy-enhancing technologies (PETs): The future of data protection

Privacy-enhancing technologies (PETs): The future of data protection

Privacy is no longer just a compliance issue, it’s a competitive advantage. As more organizations rely on data to drive innovation, the challenge becomes clear: how do we unlock insights from sensitive information without compromising individual privacy or violating regulations?

computer screen showing a graph from a data sharing platform

Unlocking new possibilities with a secure data sharing platform

Data is now one of the most valuable assets a business holds. The ability to exchange it securely and efficiently has become a competitive requirement.

futuristic image of a robot hand to symbolize the international year of quantum

Why the International Year of Quantum matters more than ever

Quantum technology has long hovered at the edge of science fiction: enigmatic, complex, and seemingly decades away from everyday use. But that future is no longer distant. In fact, it's arriving right now.

person in healthcare taking data-driven decisions

Data driven decision making in healthcare: How analytics is transforming patient care

The healthcare industry generates a massive amount of data, from patient records and clinical trial results to administrative information and research findings.

TOPPAN Edge partner with Partisia for privacy-first Digital Identities

TOPPAN Edge is partnering with Partisia to develop a fully privacy-focused digital identity using Partisia’s Decentralized Identity technology, to enable individuals to securely control their private data.

A man sitting indoors looks at his smartphone while a banking app on another phone screen shows his balance, accounts, subscriptions, and restaurant deals.

Beyond banking: New opportunities through trusted digital ecosystems

Digital banking is undergoing a subtle but transformative shift, one that’s not about launching new features or redesigning interfaces, but about how the banking app can provide tangible business value beyond traditional financial services.

A secure, decentralized approach to health data management

The true value of health data lies in its power to drive innovation and advance the greater good - improving individual health outcomes, enhancing quality of life, and streamlining workflows for healthcare professionals.

Beyond connectivity: Verified identities are telecoms valuable asset

For decades, telecom companies have quietly powered our connected world. They built the networks, managed the infrastructure, and kept the internet humming. But while they’ve been essential, they’ve rarely been at the center of digital innovation. Until now.

Graphic announcing a new partnership between Partisia and Enversion to remove middlemen in registry research for diseases, cures, and medications.

Journl and Partisia partner up to turn research data upside-down

With its digital healthcare system and accurate CPR register, Denmark could become a mecca for international health research. But strict GDPR regulations and unclear healthcare legislation have hampered innovation until now. Now, new Danish encryption and integration software will make it possible ...

Partisia, Squareroot8 and NuSpace forge alliance for quantum-secure satellite communications

Partisia, a leader in multiparty computation (MPC), and Squareroot8, a provider of quantum-safe communication solutions, alongside NuSpace, a company specializing in IoT Connectivity Services and Satellite-As-A-Service have signed a Memorandum of Understanding to advance the future of secure ...

person scanning mobile device in a supermarket using selective disclosure to only choose what data he or she wants to share

Selective Disclosure: The power to share just enough

Sometimes, less really is more. Especially when it comes to your personal information.

person trying to implement data minimization

What is data minimization? Key tools and techniques

Businesses have long been taught to collect data like it’s gold. But in today’s privacy-first world, collecting less is often the safer and more respectful choice.

Person in a shop verifying identity using a mobile device with eIDAS 2.0

eIDAS 2.0 explained: The EU’s vision for digital identity

In our digital world, proving who you are online is becoming just as important as showing your passport at the airport. Whether you’re signing a contract, accessing health records, or applying for a loan, identity verification is now a key part of how we interact digitally.

Drive customer retention for life: gain new revenue and asset control

Build life-long customer relationships. The automotive industry is undergoing a profound shift, driven by connectivity and data. Every modern vehicle comes equipped with a digital twin and an Event Data Recorder (EDR), capturing huge amounts of unused data.

person in front of laptop doing clinical research with secure data sharing

Revolutionizing clinical research with secure data sharing

The challenges of clinical research in a data-driven era: Imagine researchers from hospitals, pharmaceutical companies, and research centers joining forces on a global study for a rare disease. Each institution holds valuable patient data, representing critical pieces of the puzzle. Yet, sharing ...

Data breach originated from misconfiguration in internal IT platform

As digital systems in healthcare continue to handle more sensitive data, the need for strong security is more important than ever. While organizations work hard to balance access and security, challenges still pop up, reminding us that there's always room for improvement.

people collaborating on data using multi party computation and blockchain

Blockchain and MPC: The perfect match for secure data collaboration

In our digital world, data is the path to innovation. Think of all the breakthroughs possible if organizations could combine the data they hold, from anti-money-laundering checks among banks to research collaborations between competing companies. But how can they do so without exposing their ...

Cryptographer explaining multi party computation in front of a whiteboard

Multi-Party Computation (MPC): 5 quick insights from a Cryptographer on its growing potential

Multi-Party Computation is on its way as a revolutionary tool for secure data collaboration. We've caught up with Anders Peter Kragh, Senior Cryptographic Engineer at Partisia, to hear his take on the growing potential of this advanced technology.

Visual representation of data being kept safe by multi party computation and secret sharing

Secret Sharing and Multi-Party Computation: The key to secure data collaboration

Imagine being able to split private information – or “secrets” – into smaller pieces and distributing them securely across a network, even if not all participants trust each other. Each party holds only a share of the secret, and no single piece can reveal the entire information on its own. That’s ...

person using a digital ID on a mobile device

SingPass vs MitID: Why Singapore is outshining Denmark in digital identity management

By now, you may have realized that our digital and physical lives are merging faster than ever through the apps, services, and devices we rely on daily. Nonetheless, digital interactions have introduced major challenges in verifying identities and managing personal data. However, this isn’t a new ...

computer screen showing graphs from sharing data securely

Cross-Border KYC: A new path to secure data sharing

For multinational banks, operating across jurisdictions presents a unique challenge: ensuring compliance with local Know Your Customer (KYC) regulations while navigating the complexities of cross-border data privacy laws.

person in a bank detecting financial fraud on a laptop

How banks can unite to improve Anti-Money Laundering detection

Imagine you’re a compliance officer at PRT Bank, a medium-sized institution with branches in multiple countries. Every day, you and your team review large volumes of transactions, looking for any trace of suspicious activity - whether it’s unusually large cash deposits, suspicious cross-border ...

Person wondering about the difference between PII and personal data

PII and personal data: Definitions and examples

Personally Identifiable Information (PII) and personal data are two ways to classify sensitive information. The terms can be confusing, as both refer to data that can directly or indirectly identify an individual, but their definitions can vary depending on the legal framework in question.