Record Linkage in Healthcare Research
Background Record linkage is the process of identifying and connecting records that refer to the same entity, such as a patient, across different databases. In health research, this process is…
ENCRYPT Hackathon (2): Data Readiness for Privacy-Preserving Technologies
Join us for the ENCRYPT Hackathon! The hackathon is designed to empower researchers, data scientists and industry professionals with the skills to handle sensitive data responsibly.As the digital landscape evolves,…
ENCRYPT Final Event: ENCRYPTing Europe towards Secure and Federated Data Use
Date: Tuesday 17th June 2025Location: Stratos Vassilikos Hotel, Athens, GreeceOnline Participation will also be possibleJoin Us for the ENCRYPT Final Event titled "ENCRYPTing Europe Towards Secure and Federated Data Use"We…
ENCRYPTing Financial Data: How the ENCRYPT Project is Making FinTech Safer and Smarter
In today’s digital world, financial companies collect and process huge amounts of personal data, including banking habits, spending patterns and even the likelihood of repaying a loan. But how can…
Innovative Ontology Mapping Framework Unveiled at SWAT4HCLS 2025
An innovative framework for privacy-preserving healthcare data management was recently presented by Apostolos Mavridis at the SWAT4HCLS conference in Barcelona. This methodology integrates Large Language Models (LLMs), ontologies and vector…
ENCRYPT Hackathon: Data Readiness for Privacy-Preserving Technologies
Join us for the ENCRYPT Hackathon! The hackathon is designed to empower researchers, data scientists and industry professionals with the skills to handle sensitive data responsibly.As the digital landscape evolves,…
The Role of Differential Privacy in FinTech
In the dynamic and rapidly evolving world of FinTech, data security and privacy have become critical concerns. Financial institutions manage vast amounts of sensitive information, including personal identification data, transaction…
Implementation of a tool for risk assessment of personal data processing using a methodology based on the LINDDUN and MITRE ATT&CK frameworks
In the article “ENCRYPT Blog Series #4: Privacy Risk Assessment”, various methodologies were presented to carry out a privacy-related risk assessment. Specifically, the ENISA methodology was described, which is related…
- 1
- 2
- 3
- 4
- …
- 9
- Go to the next page
