top of page

Resources
Search
All Posts
The Privacy Enhancing Technology Stack Needed a Superhero. Enter Self-Sovereign Data.
Privacy-Enhancing Technologies (PETs) like differential privacy, homomorphic encryption, and federated learning protect data—but lack user control. Self-Sovereign Data (SSD) transforms PETs by embedding dynamic permissions, verifiable consent, and purpose enforcement directly into data.

Bill Keuntje
May 224 min read
When Data Can’t Say No: What the 23andMe Data Breach Teaches Us About the Future of Data Protection
The 23andMe data breach shows why perimeter defenses aren’t enough. Learn how self-sovereign data embeds identity-aware rules directly into the data, enabling it to govern and protect itself, even when systems fail.

Sanda Ringsma
May 82 min read
Confidios Joins NVIDIA Inception Program to Bring Self-Sovereign Data to the AI Frontier
Confidios joins the NVIDIA Inception program to scale its blockchain-powered Self-Sovereign Data solutions. By embedding identity, access rules, and cryptographic proof into the data layer, Confidios enables secure, AI-ready data exchange and governance, helping enterprises protect sensitive information and set new standards for digital integrity.

Sanda Ringsma
Apr 302 min read
Digital Operational Resilience Act (DORA) and the Digital Supply Chain: Why Digital Providers Must Step Up
DORA is changing the game for financial services and their digital providers. Financial firms must map and govern their digital supply chains, and ICT providers are now in the regulatory spotlight. Miss the mark, and risk losing key clients. Find out why resilience, transparency, and smarter compliance are now non-negotiable and what you need to do next.

Matthew Nelson
Apr 283 min read
Earth Day Breakthrough: Confidios and Morpheus.Network Launch EUDR Compliance Solution for Deforestation-Free Trade
To mark Earth Day, Confidios and Morpheus.Network have launched EUDR.Supply, a powerful compliance solution powered by self-sovereign data and automation. It enables companies to create Digital Product Passports that prove EUDR compliance with secure, traceable, and tamper-proof supply chain data, turning regulatory pressure into an opportunity for trust and transparency.

Sanda Ringsma
Apr 163 min read
Rethinking Data Protection in the Age of AI and Cyber Threats
As AI and cyber threats grow in parallel, traditional data protection methods are falling short. This article explores why legacy controls like role-based access control and masking can't keep pace with today’s risks and introduces self-sovereign data as a new approach, where data carries its own access rules, enabling secure, scalable, and privacy-preserving use across AI systems and distributed environments.

Matthew Nelson
Apr 154 min read
bottom of page