-

Sovereign AI in Europe: what changes when systems go live
“Sovereign AI” is moving from conferences into budgets. At its simplest, sovereign AI means a…
-

Podcast: AI Security Hype vs Reality
AI Security Hype vs Reality: The Year Attackers Got Smarter For years, AI in cybersecurity…
-

Homomorphic Encryption vs Trusted Execution Environments: What Recent Attacks Reveal
Trusted Execution Environments (TEEs) were once the crown jewel of confidential computing. Intel SGX, AMD…
-

Wodan AI Partners with Tunnel ID to Deliver Privacy-Preserving Identity Verification
We’re excited to announce our partnership with Tunnel ID, bringing together two breakthrough technologies to…
-

Privacy-First AI for Health: How Ciphertext Keeps Saving Lives
A pager goes off in the cardiac unit at 01:37. A nurse has to send…
-

Privacy paradox in AML regulation: Share data while not exposing PII
When EU legislators signed off on the Anti-Money-Laundering Regulation (AMLR) and Directive 6 (AMLD6) last…
-

Managing Cybersecurity and Privacy Risks in the Age of Artificial Intelligence: Launching a New Program at NIST
The rapid advancement of technology has made artificial intelligence (AI) a transformative force across various…
-

The Role of Cybersecurity in AI
Protecting AI Systems from Cyber Threats Artificial Intelligence (AI) has revolutionized various industries by enabling…

