Skip to main content

Technology (6)

Aerial view of rows of parked new cars, representing automotive production, fleet management, and vehicle data collection.

How new EU regulations and data transparency are disrupting car insurance pricing

Recently, Danish media has highlighted a significant shift in car insurance pricing, with some of the largest industry players adjusting premiums by up to 30% to 80%. While these price changes may come as a surprise to policyholders and be challenging for insurers to justify amid market ...

person looking at mobile phone device

Digital identities reinvented: From centralized control to decentralized freedom

Imagine waking up one day to find that every piece of your digital identity—from your bank accounts and personal emails to your government records—has been compromised.

person looking down

How Partisia’s decentralized identity will transform IAM, IDV & KYC providers for better security & compliance

Decentralized identity management is reshaping the digital landscape across industries. By shifting control from centralized authorities to individuals, organizations empower users to manage their own digital identities—boosting privacy, convenience, and security.

two persons talking to each other

Whistleblower systems aren’t trusted - here’s how to fix that without exposing the truth too early

Most companies claim to support whistleblowers. Few actually provide a system people trust.

person in front of laptop doing clinical research with secure data sharing

Revolutionizing clinical research with secure data sharing

The challenges of clinical research in a data-driven era: Imagine researchers from hospitals, pharmaceutical companies, and research centers joining forces on a global study for a rare disease. Each institution holds valuable patient data, representing critical pieces of the puzzle. Yet, sharing ...

Data breach originated from a misconfiguration in the internal IT platform used for research projects

As digital systems in healthcare continue to handle more sensitive data, the need for strong security is more important than ever. While organizations work hard to balance access and security, challenges still pop up, reminding us that there's always room for improvement.

people collaborating on data using multi party computation and blockchain

Blockchain and Multi-Party Computation: The perfect match for secure data collaboration

In our digital world, data is the path to innovation. Think of all the breakthroughs possible if organizations could combine the data they hold, from anti-money-laundering checks among banks to research collaborations between competing companies. But how can they do so without exposing their ...

Cryptographer explaining multi party computation in front of a whiteboard

Multi-Party Computation (MPC): 5 quick insights from a Cryptographer on its growing potential

Multi-Party Computation is on its way as a revolutionary tool for secure data collaboration. We've caught up with Anders Peter Kragh, Senior Cryptographic Engineer at Partisia, to hear his take on the growing potential of this advanced technology.

Visual representation of data being kept safe by multi party computation and secret sharing

Secret Sharing and Multi-Party Computation: The key to secure data collaboration

Imagine being able to split private information – or “secrets” – into smaller pieces and distributing them securely across a network, even if not all participants trust each other. Each party holds only a share of the secret, and no single piece can reveal the entire information on its own. That’s ...

person using a digital ID on a mobile device

SingPass vs MitID: Why Singapore is outshining Denmark in digital identity management

By now, you may have realized that our digital and physical lives are merging faster than ever through the apps, services, and devices we rely on daily. Nonetheless, digital interactions have introduced major challenges in verifying identities and managing personal data. However, this isn’t a new ...