top of page

Resources
Search
The Privacy Enhancing Technology Stack Needed a Superhero. Enter Self-Sovereign Data.
Privacy-Enhancing Technologies (PETs) like differential privacy, homomorphic encryption, and federated learning protect data—but lack user control. Self-Sovereign Data (SSD) transforms PETs by embedding dynamic permissions, verifiable consent, and purpose enforcement directly into data.

Bill Keuntje
May 224 min read
Â
When Data Can’t Say No: What the 23andMe Data Breach Teaches Us About the Future of Data Protection
The 23andMe data breach shows why perimeter defenses aren’t enough. Learn how self-sovereign data embeds identity-aware rules directly into the data, enabling it to govern and protect itself, even when systems fail.

Sanda Ringsma
May 82 min read
Â
Confidios Joins NVIDIA Inception Program to Bring Self-Sovereign Data to the AI Frontier
Confidios joins the NVIDIA Inception program to scale its blockchain-powered Self-Sovereign Data solutions. By embedding identity, access rules, and cryptographic proof into the data layer, Confidios enables secure, AI-ready data exchange and governance, helping enterprises protect sensitive information and set new standards for digital integrity.

Sanda Ringsma
Apr 302 min read
Â
Digital Operational Resilience Act (DORA) and the Digital Supply Chain: Why Digital Providers Must Step Up
DORA is changing the game for financial services and their digital providers. Financial firms must map and govern their digital supply chains, and ICT providers are now in the regulatory spotlight. Miss the mark, and risk losing key clients. Find out why resilience, transparency, and smarter compliance are now non-negotiable and what you need to do next.

Matthew Nelson
Apr 283 min read
Â
Rethinking Data Protection in the Age of AI and Cyber Threats
As AI and cyber threats grow in parallel, traditional data protection methods are falling short. This article explores why legacy controls like role-based access control and masking can't keep pace with today’s risks and introduces self-sovereign data as a new approach, where data carries its own access rules, enabling secure, scalable, and privacy-preserving use across AI systems and distributed environments.

Matthew Nelson
Apr 154 min read
Â
bottom of page