-

Sovereign AI in Europe: what changes when systems go live
“Sovereign AI” is moving from conferences into budgets. At its simplest, sovereign AI means a…
-

Podcast: AI Security Hype vs Reality
AI Security Hype vs Reality: The Year Attackers Got Smarter For years, AI in cybersecurity…
-

Homomorphic Encryption vs Trusted Execution Environments: What Recent Attacks Reveal
Trusted Execution Environments (TEEs) were once the crown jewel of confidential computing. Intel SGX, AMD…
-

Wodan AI Partners with Tunnel ID to Deliver Privacy-Preserving Identity Verification
We’re excited to announce our partnership with Tunnel ID, bringing together two breakthrough technologies to…
-

Privacy-First AI for Health: How Ciphertext Keeps Saving Lives
A pager goes off in the cardiac unit at 01:37. A nurse has to send…
-

Privacy paradox in AML regulation: Share data while not exposing PII
When EU legislators signed off on the Anti-Money-Laundering Regulation (AMLR) and Directive 6 (AMLD6) last…
-

Secure AI podcast
In this edition of the Secure AI podcast, Wodan AI’s CEO, Bob Dubois, and ethical…
-

Best Practices for Developing Secure AI Systems
Artificial intelligence (AI) is transforming various industries and enhancing the way we live and work.…
-

Balancing Innovation and Safety: Navigating AI’s Potential Risks
The rapid growth of Artificial Intelligence (AI) has opened up incredible opportunities across a variety…
-

The Role of Cybersecurity in AI
Protecting AI Systems from Cyber Threats Artificial Intelligence (AI) has revolutionized various industries by enabling…

