Skip to main content

Technology (9)

people collaborating on data using multi party computation and blockchain

Blockchain and MPC: The perfect match for secure data collaboration

In our digital world, data is the path to innovation. Think of all the breakthroughs possible if organizations could combine the data they hold, from anti-money-laundering checks among banks to research collaborations between competing companies. But how can they do so without exposing their ...

Cryptographer explaining multi party computation in front of a whiteboard

Multi-Party Computation (MPC): 5 quick insights from a Cryptographer on its growing potential

Multi-Party Computation is on its way as a revolutionary tool for secure data collaboration. We've caught up with Anders Peter Kragh, Senior Cryptographic Engineer at Partisia, to hear his take on the growing potential of this advanced technology.

Visual representation of data being kept safe by multi party computation and secret sharing

Secret Sharing and Multi-Party Computation: The key to secure data collaboration

Imagine being able to split private information – or “secrets” – into smaller pieces and distributing them securely across a network, even if not all participants trust each other. Each party holds only a share of the secret, and no single piece can reveal the entire information on its own. That’s ...

person using a digital ID on a mobile device

SingPass vs MitID: Why Singapore is outshining Denmark in digital identity management

By now, you may have realized that our digital and physical lives are merging faster than ever through the apps, services, and devices we rely on daily. Nonetheless, digital interactions have introduced major challenges in verifying identities and managing personal data. However, this isn’t a new ...

computer screen showing graphs from sharing data securely

Cross-Border KYC: A new path to secure data sharing

For multinational banks, operating across jurisdictions presents a unique challenge: ensuring compliance with local Know Your Customer (KYC) regulations while navigating the complexities of cross-border data privacy laws.

person in a bank detecting financial fraud on a laptop

How banks can unite to improve Anti-Money Laundering detection

Imagine you’re a compliance officer at PRT Bank, a medium-sized institution with branches in multiple countries. Every day, you and your team review large volumes of transactions, looking for any trace of suspicious activity - whether it’s unusually large cash deposits, suspicious cross-border ...

The world's first commercial use of Multi-Party Computation (MPC) was in a sugar beet auction

From theory to reality: The world’s first commercial use of Multi-Party Computation (MPC)

The world’s first commercial implementation of Multi-Party Computation (MPC) took place in 2008: The Danish Sugar Beet Auction. Here's the story of how sugar beets in Denmark helped pioneer this advanced technology.

Data breach exposes thousand of Danish citizens health data

Living in Denmark, it likely hasn’t escaped anyone’s attention that there’s been a lot of media coverage focused on a recent cyberattack on a Danish private practice, which led to the exposure of highly sensitive patient data, and has underscored a growing crisis in healthcare security.

Two people discussing data privacy day 2025

Data Privacy Day 2025: Forward-thinking companies will change how we look at data privacy in the future

Every January 28th, we celebrate Data Privacy Day – an international effort to create awareness for companies and people around the world to focus on respecting privacy, safeguarding data, and enabling trust.

Two people working together to talk about cybersecurity and data privacy

Data privacy vs. cybersecurity: Why one can’t work without the other

Data privacy and cybersecurity are two related yet different fields. Understanding how they are connected can help you see how each one plays a unique role, especially when it comes to protecting private data. Let’s explore what sets these concepts apart.