Blog
What are privacy-enhancing technologies and how do they work?
How innovative encryption technologies will gain traction to keep businesses safe from data leaks
The world’s first Fully Functional Data-In-Use Encryption solution is now generally available
How Vaultree makes CISOs' lives easier
How Data-In-Use Encryption Supports Organisations with GDPR Compliance
Data breaches are a major concern for organisations. From hacking to phishing and insider threats, the leak of sensitive data has severe consequences, not only in finances. We're talking about reputat
How encryption can help the finance industry win the battle against cyberattacks
Why fully functional data-in-use encryption is THE tool to help financial institutions mitigate the costs of data breaches.
Cybersecurity in 2023: What can we expect?
It's a new year, but how will the infosec industry respond with cyberattacks on the rise?
Vaultree has closed a $12.8 million dollar Series A to continue building our breakthrough solution
Here's why our $12.8 million funding round is a major development not only for us, but for the world of data privacy
Why Cybersecurity must be a top priority in Healthcare
The healthcare industry is a target for cybercriminals. Here's how cybersecurity can help protect data - and lives.
SOC 2 Compliance and Cybersecurity: How it works
This is a special blog post for us, as we are Officially SOC 2 Type II Compliant with the help of Scytale.
Vaultree and AlloyDB: the world's first Fully Homomorphic and Searchable Cloud Encryption Solution
We've partnered with Google Cloud, and our Data-in-Use Encryption for Google's AlloyDB is available for a preview trial.
Cybersecurity Outer Space: Why you should care
We might not see them, but they're everywhere. Here's why you should care about devastating cyber attacks in space.
A guide to safe passwords and extra digital security tips for the ultra paranoid
Passwords involve the weakest element in every security plan: users. Here's a safe guide to an extra layer of security for your digital life.
SQL for Beginners: A quick tutorial on how to use it
SQL stands for Structured Query Language. But how does it work? Here's what you need to know about this query language.
Phishing Explained: what you need to know to protect your data
From small frauds to corporate data breaches, phishing is rising. Here's how you can protect yourself from scammers.