Skip to main content

Technology (2)

persons working in pharma tech

Pharma tech: How technology is reshaping the pharmaceutical industry

A new type of medicine can save lives but getting it from lab to patient has never been more complex. Pharma tech is rewriting the rules of drug development, using tools like AI, blockchain, and secure computing to accelerate breakthroughs and streamline once-siloed processes.

person working with health information tech

Health information tech: How digital innovation is transforming care

In hospitals, clinics, and labs around the world, a quiet revolution is reshaping the way healthcare operates. Health information technology (health information tech) is no longer just about digitizing patient records, it’s about using data smarter, faster, and more securely to improve outcomes and ...

The Confidential Computing Consortium text and an icon from it

Pioneering with industry leaders: Confidential Computing Consortium

As part of our mission to shape a future where sensitive data can be used without ever being exposed, we’re proud to be a partner in the Confidential Computing Consortium, joining global tech leaders to define the standards and technologies that make secure data collaboration possible.

Two professionals discussing documents beside a car, representing data-driven solutions and innovation for the automotive industry.

Enhancing profitability and trust in vehicle leasing with data-driven valuations

In today's automotive landscape, car manufacturers often face a tough reality: direct sales of new vehicles sometimes mean losing money, or at best, offer very slim profit margins. This is why many manufacturers are looking towards the leasing market, seeing it as a crucial avenue for sustained ...

people collaborating on data

Data collaboration: How to unlock shared value without compromising privacy

When organizations collaborate on data, they gain new insights, better outcomes, and a competitive edge. From medical research to fraud detection and supply chain optimization, data collaboration drives smarter decision-making. But it also introduces a hard truth: the more data you share, the more ...

people around a table discussing data privacy

The ultimate guide to data privacy

Every interaction, transaction, and login leaves a data trail. The question is whether that trail leads to trust or to trouble.

two persons talking about cybersecurity

Cybersecurity - Complete guide to protecting data, systems and people

A single click can shut down a hospital. One weak password can cost millions. And a routine-looking email can be the front door to a system-wide breach.

person protecting systems against data leaks

Data leak protection: How to keep sensitive information from slipping through the cracks

A single data leak can bring down years of hard-earned trust, cost millions in fines, and open the door to reputational damage that's hard to recover from. And while high-profile breaches make headlines, everyday leaks often happen quietly - through misconfigured settings, insider mistakes, or ...

person showing a data sharing agreement

Data sharing agreement: Why it matters, and how to get it right

When two or more organizations work together, data often moves with them: Between systems, across teams, and sometimes across borders. But without clear guardrails in place, that movement can create risk, confusion, or even legal exposure.

Cracking the code on pay gaps and how PETs can help drive fair pay

As Europe prepares for the full rollout of the EU Pay Transparency Directive by June 2026, organizations across the continent are facing a critical turning point. The new rules aim to ensure that employees have access to information about pay structures and demand that companies take a closer, ...

Partisia and Trust Stamp partner to make digital IDs safer and more private by securely linking them to unique biometrics

15 May 2025 – In a major step toward strengthening digital security and privacy, two deep tech companies, Partisia and Trust Stamp, have formed a strategic partnership to develop a more accessible and resilient solution for biometric holder binding. This partnership will deliver a foundational ...

People working together to create privacy by design solutions

Privacy by design: Definition, principles, and benefits

Data drives decisions, and to collect data, you need to think about privacy and build trust. That’s where privacy by design comes in: a proactive approach that embeds privacy into the very foundation of systems and processes.

Privacy-enhancing technologies (PETs): The future of data protection

Privacy-enhancing technologies (PETs): The future of data protection

Privacy is no longer just a compliance issue, it’s a competitive advantage. As more organizations rely on data to drive innovation, the challenge becomes clear: how do we unlock insights from sensitive information without compromising individual privacy or violating regulations?

computer screen showing a graph from a data sharing platform

Unlocking new possibilities with a secure data sharing platform

Data is now one of the most valuable assets a business holds. The ability to exchange it securely and efficiently has become a competitive requirement.

two persons discussing digital identity for foreign students and workers

Digital identity is broken - here's how to fix it for foreign students and workers

Why faster, safer identity verification is no longer optional for global institutions.

futuristic image of a robot hand to symbolize the international year of quantum

Why the International Year of Quantum matters more than ever

Quantum technology has long hovered at the edge of science fiction: enigmatic, complex, and seemingly decades away from everyday use. But that future is no longer distant. In fact, it's arriving right now.

person in healthcare taking data-driven decisions

Data driven decision making in healthcare: How analytics is transforming patient care

The healthcare industry generates a massive amount of data, from patient records and clinical trial results to administrative information and research findings.

TOPPAN Edge partner with Partisia for privacy-first Digital Identities

TOPPAN Edge is partnering with Partisia to develop a fully privacy-focused digital identity using Partisia’s Decentralized Identity technology, to enable individuals to securely control their private data.

two persons doing tax control paperwork

Tax control across borders: Can you prove your transfer pricing is fair - without handing over your playbook?

The hidden cost of cross-border tax compliance. If you’re managing taxes across multiple jurisdictions, you already know the reporting burden is growing. Regulators want more transparency. Auditors expect faster turnaround. But every time you disclose internal pricing models or financial logic, ...

A man sitting indoors looks at his smartphone while a banking app on another phone screen shows his balance, accounts, subscriptions, and restaurant deals.

Beyond banking: New opportunities through trusted digital ecosystems

Digital banking is undergoing a subtle but transformative shift, one that’s not about launching new features or redesigning interfaces, but about how the banking app can provide tangible business value beyond traditional financial services.

A secure, decentralized approach to health data management

The true value of health data lies in its power to drive innovation and advance the greater good - improving individual health outcomes, enhancing quality of life, and streamlining workflows for healthcare professionals.

two regulators discussing how they can enforce compliance without compromising privacy

Oversight without overreach: How regulators can enforce compliance without compromising privacy

Turn privacy challenges into compliance strength with secure collaboration

Beyond connectivity: Verified identities are telecoms valuable asset

For decades, telecom companies have quietly powered our connected world. They built the networks, managed the infrastructure, and kept the internet humming. But while they’ve been essential, they’ve rarely been at the center of digital innovation. Until now.

Graphic announcing a new partnership between Partisia and Enversion to remove middlemen in registry research for diseases, cures, and medications.

Journl and Partisia partner up to turn research data upside-down

With its digital healthcare system and accurate CPR register, Denmark could become a mecca for international health research. But strict GDPR regulations and unclear healthcare legislation have hampered innovation until now. Now, new Danish encryption and integration software will make it possible ...

Partisia, Squareroot8 and NuSpace forge alliance for quantum-secure satellite communications

Partisia, a leader in multiparty computation (MPC), and Squareroot8, a provider of quantum-safe communication solutions, alongside NuSpace, a company specializing in IoT Connectivity Services and Satellite-As-A-Service have signed a Memorandum of Understanding to advance the future of secure ...

person scanning mobile device in a supermarket using selective disclosure to only choose what data he or she wants to share

Selective Disclosure: The power to share just enough

Sometimes, less really is more. Especially when it comes to your personal information.

person trying to implement data minimization

What is data minimization? Key tools and techniques

Businesses have long been taught to collect data like it’s gold. But in today’s privacy-first world, collecting less is often the safer and more respectful choice.

Person in a shop verifying identity using a mobile device with eIDAS 2.0

eIDAS 2.0 explained: The EU’s vision for digital identity

In our digital world, proving who you are online is becoming just as important as showing your passport at the airport. Whether you’re signing a contract, accessing health records, or applying for a loan, identity verification is now a key part of how we interact digitally.

Drive customer retention for life: gain new revenue and asset control

Build life-long customer relationships. The automotive industry is undergoing a profound shift, driven by connectivity and data. Every modern vehicle comes equipped with a digital twin and an Event Data Recorder (EDR), capturing huge amounts of unused data.

Aerial view of rows of parked new cars, representing automotive production, fleet management, and vehicle data collection.

How new EU regulations and data transparency are disrupting car insurance pricing

Recently, Danish media has highlighted a significant shift in car insurance pricing, with some of the largest industry players adjusting premiums by up to 30% to 80%. While these price changes may come as a surprise to policyholders and be challenging for insurers to justify amid market ...

person looking at mobile phone device

Digital identities reinvented: From centralized control to decentralized freedom

Imagine waking up one day to find that every piece of your digital identity—from your bank accounts and personal emails to your government records—has been compromised.

person looking down

How Partisia’s decentralized identity will transform IAM, IDV & KYC providers for better security & compliance

Decentralized identity management is reshaping the digital landscape across industries. By shifting control from centralized authorities to individuals, organizations empower users to manage their own digital identities—boosting privacy, convenience, and security.

two persons talking to each other

Whistleblower systems aren’t trusted - Fix that without exposure

Most companies claim to support whistleblowers. Few actually provide a system people trust.

person in front of laptop doing clinical research with secure data sharing

Revolutionizing clinical research with secure data sharing

The challenges of clinical research in a data-driven era: Imagine researchers from hospitals, pharmaceutical companies, and research centers joining forces on a global study for a rare disease. Each institution holds valuable patient data, representing critical pieces of the puzzle. Yet, sharing ...

Data breach originated from misconfiguration in internal IT platform

As digital systems in healthcare continue to handle more sensitive data, the need for strong security is more important than ever. While organizations work hard to balance access and security, challenges still pop up, reminding us that there's always room for improvement.

people collaborating on data using multi party computation and blockchain

Blockchain and MPC: The perfect match for secure data collaboration

In our digital world, data is the path to innovation. Think of all the breakthroughs possible if organizations could combine the data they hold, from anti-money-laundering checks among banks to research collaborations between competing companies. But how can they do so without exposing their ...

Cryptographer explaining multi party computation in front of a whiteboard

Multi-Party Computation (MPC): 5 quick insights from a Cryptographer on its growing potential

Multi-Party Computation is on its way as a revolutionary tool for secure data collaboration. We've caught up with Anders Peter Kragh, Senior Cryptographic Engineer at Partisia, to hear his take on the growing potential of this advanced technology.

Visual representation of data being kept safe by multi party computation and secret sharing

Secret Sharing and Multi-Party Computation: The key to secure data collaboration

Imagine being able to split private information – or “secrets” – into smaller pieces and distributing them securely across a network, even if not all participants trust each other. Each party holds only a share of the secret, and no single piece can reveal the entire information on its own. That’s ...

person using a digital ID on a mobile device

SingPass vs MitID: Why Singapore is outshining Denmark in digital identity management

By now, you may have realized that our digital and physical lives are merging faster than ever through the apps, services, and devices we rely on daily. Nonetheless, digital interactions have introduced major challenges in verifying identities and managing personal data. However, this isn’t a new ...

computer screen showing graphs from sharing data securely

Cross-Border KYC: A new path to secure data sharing

For multinational banks, operating across jurisdictions presents a unique challenge: ensuring compliance with local Know Your Customer (KYC) regulations while navigating the complexities of cross-border data privacy laws.

person in a bank detecting financial fraud on a laptop

How banks can unite to improve Anti-Money Laundering detection

Imagine you’re a compliance officer at PRT Bank, a medium-sized institution with branches in multiple countries. Every day, you and your team review large volumes of transactions, looking for any trace of suspicious activity - whether it’s unusually large cash deposits, suspicious cross-border ...

The world's first commercial use of Multi-Party Computation (MPC) was in a sugar beet auction

From theory to reality: The world’s first commercial use of Multi-Party Computation (MPC)

The world’s first commercial implementation of Multi-Party Computation (MPC) took place in 2008: The Danish Sugar Beet Auction. Here's the story of how sugar beets in Denmark helped pioneer this advanced technology.

Data breach exposes thousand of Danish citizens health data

Living in Denmark, it likely hasn’t escaped anyone’s attention that there’s been a lot of media coverage focused on a recent cyberattack on a Danish private practice, which led to the exposure of highly sensitive patient data, and has underscored a growing crisis in healthcare security.

Two people discussing data privacy day 2025

Data Privacy Day 2025: Forward-thinking companies will change how we look at data privacy in the future

Every January 28th, we celebrate Data Privacy Day – an international effort to create awareness for companies and people around the world to focus on respecting privacy, safeguarding data, and enabling trust.

Two people working together to talk about cybersecurity and data privacy

Data privacy vs. cybersecurity: Why one can’t work without the other

Data privacy and cybersecurity are two related yet different fields. Understanding how they are connected can help you see how each one plays a unique role, especially when it comes to protecting private data. Let’s explore what sets these concepts apart.

New regulation prevent minors from social media account in Australia

It likely hasn’t escaped anyone’s attention over the past couple of weeks - whether from magazines or news broadcasts - that TikTok, Instagram, and other social media platforms in Australia are now required to verify that users are at least 16 years old. Parental consent is no exception to this ...

Partisia COO, Peter F. Frandsen, smiling while working on a laptop with a Partisia sticker.

The future of privacy and security: Conversation with COO at Partisia

“First and foremost, I don’t believe in revolutions. For one, very few of them ended well. I’d rather say; the train is moving, so jump on board! - there’s room for everyone.” - Peter Frands Frandsen

Improve recovery of critical data in disaster zones

Did you know that Japan has kept detailed earthquake records for over a thousand years? Given this history, it’s no surprise that Japan is among the most earthquake prone countries in the world. Every year, Japan experiences more than a thousand earthquakes. Most are mild enough not to cause any ...

person paying in a tablet using a digital ID wallet with DID made in according to eIDAS

What would eIDAS mean for wallet and DID providers?

The eIDAS regulation is set to transform the way we see and use digital identity across Europe, and wallet and Decentralized Identity (DID) providers are at the forefront of this evolution. But what does this mean for the industry - and for the citizens of Europe?

Protecting health data in a time of evolving privacy concerns

As privacy issues around personal health data make headlines, one of the most urgent questions facing society is: Who truly owns our data? And perhaps more critically, how can we be assured that our data won’t be used against us?