What are privacy-enhancing technologies and how do they work?

How innovative encryption technologies will gain traction to keep businesses safe from data leaks

March, 17 2023 in Encryption

How Data-In-Use Encryption Supports Organisations with GDPR Compliance

Data breaches are a major concern for organisations. From hacking to phishing and insider threats, the leak of sensitive data has severe consequences, not only in finances. We're talking about reputat

February, 18 2023 in Hot Trends

How encryption can help the finance industry win the battle against cyberattacks

Why fully functional data-in-use encryption is THE tool to help financial institutions mitigate the costs of data breaches.

February, 07 2023 in Cybersecurity

Cybersecurity in 2023: What can we expect?

It's a new year, but how will the infosec industry respond with cyberattacks on the rise?

January, 03 2023 in Hot Trends

Vaultree has closed a $12.8 million dollar Series A to continue building our breakthrough solution

Here's why our $12.8 million funding round is a major development not only for us, but for the world of data privacy

December, 19 2022 in Product Updates

Why Cybersecurity must be a top priority in Healthcare

The healthcare industry is a target for cybercriminals. Here's how cybersecurity can help protect data - and lives.

December, 15 2022 in Cybersecurity

SOC 2 Compliance and Cybersecurity: How it works

This is a special blog post for us, as we are Officially SOC 2 Type II Compliant with the help of Scytale.

December, 01 2022 in Cybersecurity

Vaultree and AlloyDB: the world's first Fully Homomorphic and Searchable Cloud Encryption Solution

We've partnered with Google Cloud, and our Data-in-Use Encryption for Google's AlloyDB is available for a preview trial.

October, 11 2022 in Product Updates

Cybersecurity Outer Space: Why you should care

We might not see them, but they're everywhere. Here's why you should care about devastating cyber attacks in space.

October, 03 2022 in Cybersecurity

A guide to safe passwords and extra digital security tips for the ultra paranoid

Passwords involve the weakest element in every security plan: users. Here's a safe guide to an extra layer of security for your digital life.

September, 21 2022 in Cybersecurity

SQL for Beginners: A quick tutorial on how to use it

SQL stands for Structured Query Language. But how does it work? Here's what you need to know about this query language.

September, 14 2022 in DevOps

Phishing Explained: what you need to know to protect your data

From small frauds to corporate data breaches, phishing is rising. Here's how you can protect yourself from scammers.

September, 13 2022 in Cybersecurity