Insights
Privacy-preserving intelligence.
Searchable encryption, compliance, and the future of running analytics on data you can never decrypt.
Why School Districts Are Racing to Adopt Privacy-Preserving Technologies: A Response to Rising Data Protection Demands
School districts urgently need privacy-preserving tech after a major 2024 data breach. Learn how encryption and zero-trust architectures protect student data, ensure compliance, and rebuild trust in K-12 EdTech.
Read story →
Turn New Privacy Rules Into Your Competitive Advantage: The EDPB Pseudonymization Breakthrough
What's in a name? How the EDPB's recent guidance on pseudonymization pave the way for better, smarter, faster data sharing.
Practical Implications of the New EDPB Pseudonymization Guidelines
Learn how the proposed EDPB guidelines may impact your organization in part two of this three-part series.
The Evolution of the EDPB’s Pseudonymization Guidance
Explore the new EDPB pseudonymization guidance and discover how data privacy laws are shaping compliance strategies.
Searchable Encryption: The “Just Right” Balance of Data Privacy and Usability
At a high level, searchable encryption lets a server search data it cannot read, using cryptographic values as stand-ins for actual ones. There are a few flavors of implementations, but let’s focus on the basic idea common to many (often called Searchable Symmetric Encryption, SSE).
Data Protection in 2025: A Pivotal Digital Transformation
Explore how data protection is evolving in 2025. Learn why zero-trust architecture, encryption-in-use, and privacy-enhancing tech are redefining secure analytics.
The Finalization of Section 1033 "Open Banking" Rule
Discover the opportunities of open banking! Learn how financial institutions and software vendors can overcome challenges, foster trust, and drive innovation in a more connected and secure digital financial ecosystem.
Building a Holistic Data Protection Posture for 2025
It takes more than just a great product to compete in today's market. A strong data practice can give your organization a competitive edge.
Closing Deals with Data Privacy and Security Excellence: A Roadmap for 2025 and Beyond
Your step-by-step guide to building a data privacy and security posture that accelerates growth.
Privacy-enhancing Technologies (PETs) Decoded: An Essential Guide for 2025
In today's digital landscape, organizations face unprecedented challenges in data management and privacy. With stringent regulations, rising cybercrime, and waning consumer trust, businesses must balance data protection with utility. This comprehensive guide explores privacy-enhancing technologies (PETs) - the key to unlocking safe, responsible data use on your 2025 roadmap.
Blind Insight Selected as Member of ARPA-H Investor Catalyst Hub Spoke Network
Blind Insight Joins a Nationwide Network Working to Accelerate Transformative Health Solutions
HumAIn Podcast: The Data Dilemma: How Blind Insight is Revolutionizing Secure Analytics for Enterprises
Data protection, or data utility? The trillion-dollar question. Blind Insight co-founders Nick Sullivan and Jackie Peters discuss this tradeoff, and how technologies like Blind Insight's searchable encryption are helping organizations find a secure and private middle-ground.
You (Probably) Don’t Need Fully Homomorphic Encryption (FHE)
While fully homomorphic encryption (FHE) captures the spotlight. Businesses need privacy, security, and compliance, and they need real-time data in their software applications. This is where searchable encryption shines.
Blind Insight Named Top Woman-Led Startup
Blind Insight named top women-led startup by Integra Groupe.
How to Optimize Use of Health App Data While Protecting Users
HealthTech apps must balance privacy and security with innovation.
Data protection or data utility? The trillion-dollar question
Historically, we've been forced to choose between data protection and data utility. This has resulted in trillions in losses due to cybercrime and missed opportunity costs.