Resources

Learn why having a secure and confidential way to collaborate on data matters more than ever.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Articles
Case Studies
Webinars
Whitepapers
article
Three Key Takeaways from the Secure and Private Compute Summit

We’re proud to have been a part of the first ever summit focusing on privacy-enhancing computation solutions in early-July, and here we share our three key takeaways from the Secure and Private Compute Summit!

Three Key Takeaways from the Secure and Private Compute Summit
article
Data clean rooms - A new approach to confidential benchmarking

Market research firms face challenges to conducting competitive benchmarking studies – all of which center on participating companies’ concerns on data privacy and meeting regulatory requirements.

Data clean rooms - A new approach to confidential benchmarking
article
What are data clean rooms and how to pick the right one for you?

While today's data clean rooms facilitate analysis of sensitive and confidential data within pre-defined guidelines and privacy controls, many still do not fully address the need for increased data security and data privacy, especially in highly regulated industries.

What are data clean rooms and how to pick the right one for you?
Confidential Computing
What the SolarWinds data breach means for companies going forward

In December 2020, SolarWinds, Inc., a leading provider of network performance monitoring tools, suffered attack from a SUNSPOT malware. It hit not just SolarWinds, but also its clients, including US government agencies and Fortune 500 companies, leaving valuable data assets exposed and compromised.

What the SolarWinds data breach means for companies going forward
Confidential Computing
How companies in 2021 can effectively drive machine learning by harnessing their data ecosystems.

Learn how data ecosystems allow companies to enhance the sophistication of their data-driven decision making and machine learning models.

How companies in 2021 can effectively drive machine learning by harnessing their data ecosystems.
Confidential Computing
Privacy enhancing computation is one of Gartner's top tech trends in 2021

"This trend enables organizations to collaborate on research securely across regions and with competitors without sacrificing confidentiality. This approach is designed specifically for the increasing need to share data while maintaining privacy or security."

Privacy enhancing computation is one of Gartner's top tech trends in 2021
article
Data tooling for the next trillion-dollar companies

Reports and market caps show that being a data-driven company is not only paying off, but also that it is becoming the only option to navigate the data producing economy we live in. Companies understand this, so they rush to update their business models to become “data-driven” or “data-first”.

Data tooling for the next trillion-dollar companies
Academia
Membership Inference as a Model Training Metric

The question of data privacy in machine learning is still widely overlooked. In this blog, we propose a new machine learning training metric that greatly reduces the risk of data reidentification. It can be embedded in any model training with minimal cost.

Membership Inference as a Model Training Metric
Confidential Computing
Confidential Computing and GDPR

Mergers and acquisitions (M&A) totalled in worth almost $2.49 trillion in the first three quarters of 2019. Some prominent examples are Saudi Aramco/Saudi Basic Industries Corporation, AbbVie/Allergan, Bristol-Myers Squibb/Celgene, and United Technologies/Raytheon.

Confidential Computing and GDPR
article
Confidential computing in the telco industry

What is blocking telcos from leveraging more of their networks, the generated data and machine learning? Two things: data security and data privacy. This is where confidential computing comes into play.

Confidential computing in the telco industry
Confidential Computing
The Key to Sensitive Data Analytics is Encrypted in an Enclave

Combining datasets across organizations can unlock huge value, but companies are reluctant to share data due to sensitivity concerns. In this post we explore how we remove the need for a trusted third party (even Decentriq!), by using Intel® Software Guard Extensions (Intel® SGX).

The Key to Sensitive Data Analytics is Encrypted in an Enclave
Confidential Computing
Data Collaboration Made Simple and Safe: Applications in the Health Care Sector

People acknowledge the value of data and the benefits of data collaborations. Yet, concerns about data privacy and security are increasing. To solve these challenges, the leaders in the field of confidential computing establish new technologies to make data collaborations simple and safe.

Data Collaboration Made Simple and Safe: Applications in the Health Care Sector
Academia
Closing the circle of security in the cloud

Until today, data-sensitive companies are unable to utilize the immense benefits of cloud computing. Confidential Computing is here to change this. It is well known that cloud-computing offers many advantages, from increased scalability to reduced operations costs.

Closing the circle of security in the cloud
article
Efficient ECC in zkSNARKs using ZoKrates

Elliptic Curve Cryptography (ECC) is a powerful tool that has many applications in the blockchain space and cryptography in general. With one of the last releases, we added support for efficient ECC-based cryptographic primitives inside a zkSNARK construction.

Efficient ECC in zkSNARKs using ZoKrates
article
Is it a match? A privacy-preserving analytics tool

Buying data is a lengthy process on its own. Finding the right vendor, type of data, and passing all the regulatory and legal procedures takes time and costs money. On top of that, in practical reality, the procedure is even lengthier because it starts before the decision to buy the data.

Is it a match? A privacy-preserving analytics tool
article
A new model for AI governance

Over the last centuries, humanity has tested various governance models for society and individuals. Checks and balances, separation of powers and democracy to be governed as fair as possible. It’s about not giving too much power to a single entity by having proper governance methods in place.

A new model for AI governance
article
Why privacy-preserving analytics are crucial for the data economy

Today for most organizations it is hard to impossible to benefit from artificial intelligence (AI). Especially, when it comes to training and applying machine learning models because they require substantial investments of money, time, data and expertise.

Why privacy-preserving analytics are crucial for the data economy
Confidential Computing
A cryptographic paradigm shift in data cybersecurity

According to the annual WEF report on global risks, increased cyber-threats is one of the biggest risks that companies and countries face right now. One of the most common is data breach where attackers target the database of the company in order to get access to customer data.

A cryptographic paradigm shift in data cybersecurity
article
Brief Introduction to Secure Cryptographic Enclaves

When Apple released the iPhone 5S in 2013, most people focused on its new camera and features such as Touch ID. However, on top of these features, Apple introduced the Secure Enclave Processor (SEP) as a separate sub-processor that would store sensitive data and run computer programs on top of it.

Brief Introduction to Secure Cryptographic Enclaves
article
The evolution of cryptography (deciphered)

Cryptography is the backbone of our current digital society, but how did it become so important? Interestingly, the systematic study of cryptography as science started only during the past century. The first type of cryptography was writing since the majority of people could not read.

The evolution of cryptography (deciphered)
Academia
Proving Knowledge of a Hash Pre-Image with ZoKrates

In this blog we implement a problem very typical for blockchain use-cases: proving the knowledge of a pre-image for a given SHA-256 digest. We will begin demystifying this machinery by computing the SHA-256 hash of the number 5. We will navigate through several options using different languages.

Proving Knowledge of a Hash Pre-Image with ZoKrates
Academia
Introduction to zk-SNARKs (Part 1)

In this series of posts, we will look at ZKPs: a family of probabilistic protocols that has garnered increased popularity with the rise of distributed ledger technology (DLT). Let us introduce some of the theory behind this groundbreaking work and the components of its intricate machinery.

Introduction to zk-SNARKs (Part 1)
CASE STUDY | BANKING
Swisscom (Confidential Insights)

Decentriq and Swisscom have created a platform called Confidential Insights. Learn more about how we assessed the current landscape, challenges and the opportunity to create confidential surveys.

CASE STUDY | healthcare
LynxCare

Read how LynxCare used the Decentriq platform to combine and analyze data across multiple hospitals on public cloud without the raw data ever being accesible to anyone but the hospital.

CASE STUDY | media
Koe Koe Tech

Hate speech, fake news, and incitement of violence are rampant on social media. Read how Koe Koe Tech, an IT social enterprise, is partnering with Decentriq to combat dangerous social media content through protected data analytics.

Webinar
[Panel] Microsoft, PostFinance, and Decentriq on enabling data use cases previously not possible

Watch on-demand as Stefan Deml, Co-Founder and CTO of Decentriq, joins Vikas Bhatia, Head of Product, Azure Confidential Computing at Microsoft, and Alice Dal Fuoco, Innovation Manager at PostFinance, for a discussion on how confidential computing enables data use cases previously not possible.

[Panel] Microsoft, PostFinance, and Decentriq on enabling data use cases previously not possible
Webinar
[Presentation] LynxCare and Decentriq on unlocking sensitive healthcare data to drive RWE collaborations

Watch on-demand as Maximilian Groth, Co-Founder and CEO of Decentriq, and Georges De Feu, CEO & Co-Founder of LynxCare, share how to unlock sensitive healthcare data to drive real-world evidence (RWE) collaborations between hospitals and pharmaceutical companies.

[Presentation] LynxCare and Decentriq on unlocking sensitive healthcare data to drive RWE collaborations
Webinar
[Podcast] Intel® Chip Chat - The Key to Sensitive Data Analytics is Encrypted in an Enclave

Stefan Deml, Co-Founder and CTO of Decentriq, is the guest speaker on this episode of Intel® Chip Chat. Stefan covers what Decentriq is doing to offer solutions that prioritize data safety and simplicity in a new era of confidential computing.

[Podcast] Intel® Chip Chat - The Key to Sensitive Data Analytics is Encrypted in an Enclave
Webinar
[Webinar] Mandatory data-sharing versus data sovereignty

David Sturzenegger, Head of Product at Decentriq, is one of the panel speakers in this Science|Business online webinar, which explores how policymakers could and should shape the flow of data between countries and between the public and private actors.

[Webinar] Mandatory data-sharing versus data sovereignty
Webinar
[Webinar] Intel, Swiss Re, and Decentriq on unlocking the value of private data

As companies are becoming more and more data driven, the need for stronger privacy and confidentiality in the cloud has never been greater. Tune in on-demand for our webinar co-hosted with Intel and Swiss Re on how companies can unlock the value of private data.

[Webinar] Intel, Swiss Re, and Decentriq on unlocking the value of private data
technical whitepaper
Decentriq - A deep dive into our platform

Access our technical whitepaper that deep dives into the Decentriq platform and how we leverage confidential computing to enable verifiably trusted and secure data collaboration.

Get in touch

Interested in how Decentriq can solve your current challenges? Request a free demo and consultation.

Request a demo

hello@decentriq.com

Follow us
Copyright ©2021 dq technologies AG
Gutstrasse 73 8055 Zürich SwitzerlandPrivacy Policy
Subscribe to our newsletter
Receive notifications about industry news and product updates.