RESOURCE LIBRARY
Webinar

Trends in Securing Sensitive Data with Privacy Enhancing Technologies

On this page
An icon depicting one person watching another on a video screen, symbolizing video conferencing or online communication, against a solid background.

While many organizations perceive cloud security to be strong, there are still significant risks that traditional approaches cannot eliminate. However, emerging privacy-enhancing technologies (PETs) such as confidential computing, homomorphic encryption, and others are now addressing that last mile in data security.

In this on-demand webinar, Anjuna Security will discuss:

  • The results of CSA’s recent industry-wide survey - Sensitive Data in the Cloud
  • Key findings such as:
  • Where sensitive data is currently held
  • Most popular security controls used to protect sensitive data
  • Future initiatives with securing sensitive data
  • Different privacy-enhancing technologies (Confidential Computing, Homomorphic Encryption, and others)

Resources

An icon depicting one person watching another on a video screen, symbolizing video conferencing or online communication, against a solid background.
An icon depicting one person watching another on a video screen, symbolizing video conferencing or online communication, against a solid background.

While many organizations perceive cloud security to be strong, there are still significant risks that traditional approaches cannot eliminate. However, emerging privacy-enhancing technologies (PETs) such as confidential computing, homomorphic encryption, and others are now addressing that last mile in data security.

In this on-demand webinar, Anjuna Security will discuss:

  • The results of CSA’s recent industry-wide survey - Sensitive Data in the Cloud
  • Key findings such as:
  • Where sensitive data is currently held
  • Most popular security controls used to protect sensitive data
  • Future initiatives with securing sensitive data
  • Different privacy-enhancing technologies (Confidential Computing, Homomorphic Encryption, and others)
By submitting this form you agree to the Anjuna Privacy Policy.
Thanks for your interest in Anjuna!
Oops! Something went wrong while submitting the form.

Learn More

No items found.
No items found.
No items found.

See the power of protection for yourself

Don't Delete
No items found.
No items found.
No items found.