Skip to main content

Technology

Privacy and data protection solutions for financial services (2026)

Privacy and data protection solutions for financial services (2026)

Privacy and data protection solutions explained Why traditional security stacks no longer hold up Core technology categories How to choose the right mix Financial services use cases that matter Common mistakes to avoid Local perspective - Aarhus, Denmark Expert commentary from Partisia Quick ...

Confidential computing techniques

Confidential computing techniques to protect sensitive data (2026)

What techniques are used in confidential computing to protect sensitive data? Confidential computing protects data during processing, but it also introduces trust assumptions that many vendor pages gloss over. Platforms such as Partisia’s secure computation framework operationalize confidential ...

Fraud detection tools financial institutions

Most effective fraud detection tools for financial institutions (2026)

What are the most effective fraud detection tools for financial institutions? Fraud detection is no longer about having the biggest internal dataset. It is about using the right mix of monitoring, analytics, and privacy-preserving collaboration so institutions can detect organized fraud without ...

Federated learning in finance – privacy-safe AI collaboration

Federated learning explained – compliant AI for financial institutions

What federated learning is and why it matters in finance Federated learning is a machine learning approach that allows multiple organizations to train a shared AI model without pooling their underlying data. Instead of moving sensitive datasets to a central location, the model is distributed to ...

Business wallet EU identity – what it means for companies

EU business wallet identity – how it works and what to prepare for

Business wallet EU identity – what it means and how it works The Business Wallet is the EU’s new identity solution for companies. It gives organizations a secure, verifiable way to prove who they are and to exchange trusted business information across borders. The initiative sits within the wider ...

EU business wallet regulation explained for 2026 and beyond

EU business wallet regulation explained for 2026 and beyond

What the European business wallet regulation aims to achieve The European business wallet regulation is part of a broader push to modernize how companies identify themselves, exchange documents, and meet compliance duties across the EU. Instead of relying on local portals, unverified PDFs, or ...

Decentralized identity Europe – standards, use cases and 2026 outlook

Decentralized identity Europe – standards, use cases and 2026 outlook

Decentralized identity Europe – what it means and why adoption is accelerating Europe is moving quickly toward decentralized identity as the foundation for secure and trusted digital services. Driven by the EUDI Regulation, updates to eIDAS 2.0, and increasing demand for privacy-preserving ...

EUDI wallet 2026 guide for businesses and service providers

EUDI wallet 2026 guide for businesses and service providers

What the EUDI wallet is and why the EU is introducing it The European Digital Identity Wallet (EUDI wallet) is a mobile identity wallet that lets citizens, residents, and businesses prove who they are and share verified attributes across the EU. It is defined in Regulation (EU) 2024/1183, which ...

Decentralized identity data privacy

How decentralized identity improves data privacy for users (2026)

Decentralized identity can reduce breach risk and improve user control, but only when implemented with real verification and minimal data retention. Answer Decentralized identity improves privacy by reducing centralized storage of personal data and enabling consent-based verification. Instead of ...

digital product passport - coffee

European Business Wallet (EUBW) & Digital Product Passport (DPP)

European Business Wallet (EUBW) is a digital identity solution that enables companies to identify themselves online, exchange verifiable information, and manage documentation securely and in a standardized way across the EU.

Know Your Business (KYB) – modern verification for regulated industries

Know Your Business (KYB) – modern verification for regulated industries

Know Your Business (KYB) – what it is, why it matters, and how to modernize compliance Know Your Business (KYB) is now a core requirement for regulated industries. Banks, fintechs, payment providers, corporate marketplaces, and B2B platforms must verify the legitimacy of any business they serve — ...

EUBW (EU Business Wallet): A shift in how companies identify themselves

EU Business Wallet (EUBW): what it means for firms in the EU

The EU is building more than a digital identity system for individuals. The EUBW (EU Business Wallet) is the corporate version: a verified wallet for companies that want to operate across the Union without running into slow, outdated checks.

The ultimate list of data privacy and compliance statistics 2026

The ultimate list of data privacy and compliance statistics 2026

Why data privacy and compliance statistics matter in 2026 Data privacy has moved from an IT function to a global economic issue. As regulators expand enforcement and digital ecosystems become more connected, institutions are being judged by how they protect and manage personal data. In 2026, ...

Digital identity wallet Europe – how it works and what comes next

Digital identity wallet Europe – how it works and what comes next

What Europe’s digital identity wallet is designed to solve Europe is building a digital identity wallet to allow citizens and businesses to verify who they are online without relying on scattered national systems or private identity providers. The goal is simple: give people and companies a single, ...

Suspicious activity monitoring – turning regulatory compliance into real-time intelligence

Suspicious activity monitoring (SAM) is the foundation of every financial institution’s defense against money laundering, terrorist financing, and fraud. It is the process that identifies unusual customer behavior and triggers alerts for further review, investigation, and reporting to Financial ...

Perpetual KYC (pKYC)

Perpetual KYC (pKYC) – real-time compliance for the modern financial institution

Traditional Know Your Customer (KYC) processes have always been reactive. Banks review customer profiles at onboarding and at fixed intervals — every one, three, or five years. Between those reviews, risk can change, and institutions often remain blind to evolving customer behavior.

Data Encryption Platforms

Cybersecurity platforms with strong data encryption features (2026)

Which cybersecurity platforms offer the best features for data encryption? “Best” depends on key governance, access control, auditability, and operational discipline. Many platforms claim strong encryption. Fewer make it hard to misuse. Partisia is one example of a platform used when organizations ...

Customer due diligence (CDD)

Customer Due Diligence (CDD) – strengthening financial integrity through smarter compliance

Customer Due Diligence (CDD) lies at the heart of every financial institution’s Anti-Money Laundering (AML) framework. It ensures that businesses truly know who they are dealing with — and that every customer relationship is evaluated for risk, legitimacy, and transparency.

RegTech - Regulatory Technology

Regulatory technology (RegTech) – the new foundation of digital compliance

Regulatory technology, or RegTech, has moved from a niche innovation to a core component of financial compliance strategy. In an era of rapid regulatory change and constant scrutiny, traditional manual compliance methods are no longer sustainable.

Model training in regulated industries

Model training in regulated industries – privacy-first approaches

Why model training has become a compliance challenge Model training sits at the core of modern AI systems. In financial services, insurance, and other regulated industries, models are increasingly used to detect fraud, assess risk, and automate decision-making. However, as models grow more ...

ID verification

ID verification – secure identity checks for compliance and trust

ID verification (IDV) is the first step in building digital trust. It determines whether a person is who they claim to be before they can open an account, make a payment, or access a regulated service.

FATF compliance technology – how innovation drives global AML performance

Financial institutions are under pressure to prove the effectiveness of their anti-money laundering (AML) and counter-terrorist financing (CTF) programs, not just their existence. The Financial Action Task Force (FATF) sets the global standard, but compliance success now depends on how well ...

Decentral identity

Decentral identity – secure, compliant, and privacy-preserving ID

Digital identity systems are at a crossroads. Traditional centralized identity databases expose sensitive personal data to breaches, misuse, and surveillance.

Healthcare PoC proves secure data collaboration works

Healthcare PoC proves secure data collaboration works

Data has the power to transform healthcare, research, and public services, but sharing sensitive personal data safely has always been a major challenge. Organizations face a false choice: unlock insights and risk privacy, or protect privacy and miss critical opportunities. Across Sweden, Norway, ...

SSN validator

SSN validator – privacy-safe social security number verification

Verifying Social Security Numbers (SSNs) is one of the most effective tools in detecting identity fraud, false claims, and synthetic identities.

Social security number lookup

Social security number lookup – fraud prevention through privacy

A social security number lookup helps institutions verify that an identity is genuine, consistent, and not linked to known fraud or misuse.

Partisia and Squareroot8 launch FracQtion to solve quantum threats

Partisia (DK), a global leader in cryptographic software, and Squareroot8 (SG), a quantum-safe hardware innovator, today announced the launch of FracQtion - a jointly developed product designed to protect high-trust sectors, such as finance and telecoms, from quantum computing threats.

FATF recommendations – how financial institutions put global AML standards into action

The Financial Action Task Force (FATF) sets the global benchmark for anti-money laundering (AML), counter-terrorist financing (CTF), and counter-proliferation financing (CPF). Its 40 Recommendations, adopted by over 200 jurisdictions, guide how countries and institutions detect, prevent, and report ...

Enable age verification while protecting both safety and privacy

EU Regulation is on the move, but the implementation matters The European Union is advancing a new wave of digital regulation, placing children's online safety firmly in focus. Several legislative efforts are converging on this issue, from the Digital Services Act (DSA) to national laws targeting ...

Two professionals analyzing financial data on screens and devices, representing AML compliance, UK financial crime prevention, and regulatory reporting.

PoC: How banks collaborate on AML data without sharing private info

Money laundering is a problem no bank can solve alone. But working together is tricky, especially when it comes to sharing sensitive customer data.

Smartphone contactless payment at a store, representing how interoperability works.

Interoperability: Definition & synonyms

Interoperability is a word that’s becoming increasingly common in tech, healthcare, finance, and supply chain conversations, but it’s not always clear what it really means or what to call it when you don’t want to repeat the term a dozen times.

Person using a smartphone to make a contactless payment, highlighting digital wallet innovations in modern financial technology.

The latest digital wallet innovations you need to know in 2025

Digital wallets can do much more than simply storing credit cards on a smartphone. They’ve become powerful tools that change how people can pay, prove their identity and keep their information safe. New features like facial recognition, digital IDs, and advanced privacy technology are leading this ...

EU flags outside a government building, symbolizing the DORA regulation impacting financial institutions in 2025.

DORA regulation explained: What it means for financial institutions in 2025

DORA is about to change how financial companies handle digital risk. If you’re a bank, insurer, investment firm, or a tech provider supporting these institutions, this new EU law will affect how you manage cybersecurity, outages, and third-party IT systems.

Secure digital identity and a new standard for airport travel

Air travel depends on trust. We expect our personal information to be handled with care while we move through airports and across borders. If you have been traveling and shared your information with Air France you might have been one of many passengers who recently have received an email from the ...

Denmark to host the world's most powerful Quantum Computer

“This moves us from secure communication to secure computation, opening a new chapter in quantum. Anders Peter Kragh Dalskov Senior Cryptographic Engineer, Partisia

Fuzzy logic in fraud detection

Fuzzy logic in fraud detection for financial services

Financial fraud has never been a static problem. As systems evolve and data volumes grow, fraudsters adapt. They exploit ambiguity, timing gaps, and patterns that traditional binary detection systems often miss. The problem is not that institutions lack data, but that their systems still tend to ...

Traceability in the supply chain: Building trust and transparency from source to shelf

Production is happening all over the world. Consumers are more aware of what they’re buying. Two reasons why supply chain traceability has become the new standard. Doesn’t matter if it's a luxury good, a pharmaceutical shipment, or a grocery item, people want to know where products come from, how ...

Interoperability explained: The key to smarter, connected systems

Ever wondered what makes systems work together seamlessly? Interoperability is the answer. Data is everywhere, but it rarely speaks the same language across platforms. That’s why interoperability is the quiet hero behind the scenes, turning chaos into clarity.

Two professionals analyzing financial data on a tablet and laptop, discussing fintech solutions for trading and investment.

Fintech's future is private: how privacy-enhancing technologies are reshaping finance

The financial technology (fintech) sector is driving disruption, constantly pushing the boundaries of banking, insurance, and payments. But increasing digitization also means data is being shared more than ever, raising new concerns around cyber threats, compliance, and consumer trust.

Two financial professionals reviewing data at a computer, representing security in finance through careful monitoring and risk management.

Security in finance: Protecting data in a digital age

Financial institutions are responsible for protecting some of the most sensitive data imaginable: bank account numbers, transaction histories, investment portfolios, and personal identification details.

Whitepaper: Secure Multi-party Computation goes live

Read the official whitepaper that reports on the first large-scale and practical application of Secure Multi-Party Computation, which took place in January 2008.

Delivery worker using a tablet to manage packages, supporting product traceability in the supply chain.

Why product traceability is the backbone of secure and transparent supply chains

Being able to prove a product’s origin story and verify how it was stored and transported turns messy supply chains into transparent, trusted ecosystems. But most systems are still stuck in the digital Stone Age.

Worker using tablet and scanner in warehouse, demonstrating asset tracking software in use.

Asset tracking software: How supply chains stay efficient, compliant, and connected

Asset tracking software has become mission-critical for modern supply chains. From real-time visibility to regulatory compliance, it empowers companies to manage goods, tools, and materials with speed and precision across borders, systems, and partners.

Lab technician analyzing samples with a microscope connected to a laptop, demonstrating the use of health tech in medical diagnostics.

Health tech: How technology is reshaping modern healthcare

Health tech is changing the way healthcare systems operate, quietly improving the tools, workflows, and decisions behind patient care.

Revolutionize your Supply Chain for strategic advantage with Digital Product Passports - the journey of trust

The great paradox: How to innovate with AI while keeping data safe

In today's world, where almost everything is driven by data, Artificial Intelligence (AI) is the engine of progress. From revolutionizing healthcare to powering smart cities, AI demands vast amounts of data to learn and evolve. Yet, this hunger for data often clashes with an equally critical ...

Warehouse workers organizing and transporting boxes between tall shelves stocked with goods and containers

Non-fungible token (NFT) meaning: What it is and how it’s transforming supply chains

NFTs, or non-fungible tokens, are often associated with digital art and collectibles. But in today’s complex global supply chains, their real power lies in authenticating physical goods, proving provenance, and building transparency into every step of a product’s journey.

Danish Researchers and Companies partners to Quantum-Secure Future Cybersecurity

Researchers and Companies partners to Quantum-Secure Cybersecurity

Innovation Fund Denmark is investing DKK 25.9 million in a new groundbreaking quantum technology project, designed to develop world-leading technology in future-proof data protection.

Revolutionize your Supply Chain for strategic advantage with Digital Product Passports - the journey of trust

Revolutionize Supply Chain for advantage with Digital Product Passport

For too long, the journey of products from their origin to your customer's hands has been either non-existing or mired in paperwork, fragmented data, and lingering doubts about trust.

Scientist using a microscope in a lab, highlighting data security in healthcare research

Data security in healthcare: Protect patient privacy in a digital age

In healthcare, data saves lives, but it needs to be protected. As hospitals, clinics, and research institutions digitize operations, data security in healthcare has become one of the industry’s most urgent challenges.

person using a mobile device to scan digital product passport using a QR code

Digital product passport: Smart and secure supply chain compliance

Ever wondered what your products would say if they could talk? A digital product passport gives every item a voice: a transparent, tamper-proof record of its origin, materials, and journey through the supply chain. From how it was made to how it can be reused or recycled, it’s all there in one ...