-

Sovereign AI in Europe: what changes when systems go live
“Sovereign AI” is moving from conferences into budgets. At its simplest, sovereign AI means a…
-

Podcast: AI Security Hype vs Reality
AI Security Hype vs Reality: The Year Attackers Got Smarter For years, AI in cybersecurity…
-

Homomorphic Encryption vs Trusted Execution Environments: What Recent Attacks Reveal
Trusted Execution Environments (TEEs) were once the crown jewel of confidential computing. Intel SGX, AMD…
-

Wodan AI Partners with Tunnel ID to Deliver Privacy-Preserving Identity Verification
We’re excited to announce our partnership with Tunnel ID, bringing together two breakthrough technologies to…
-

Privacy-First AI for Health: How Ciphertext Keeps Saving Lives
A pager goes off in the cardiac unit at 01:37. A nurse has to send…
-

Privacy paradox in AML regulation: Share data while not exposing PII
When EU legislators signed off on the Anti-Money-Laundering Regulation (AMLR) and Directive 6 (AMLD6) last…
-

Secure AI podcast
In this edition of the Secure AI podcast, Wodan AI’s CEO, Bob Dubois, and ethical…
-

Why FHE in Federated Learning?
Why FHE in Federated Learning? 1. Enhanced Privacy: FL already ensures data stays on the…
-

How does Fully homomorphic encryption (FHE) differ from Partial homomorphic encryption (PHE)?
Homomorphic encryption is a cutting-edge cryptographic technique that allows computations on encrypted data without decryption,…
-

Best Practices for Developing Secure AI Systems
Artificial intelligence (AI) is transforming various industries and enhancing the way we live and work.…

