Show Notes
In this episode, Chris and Ron interview Derek Wood from Duality Technologies, a leading privacy technology company to discuss the concept of homomorphic encryption and its significance in data security, privacy, and governance.
Homomorphic encryption enables users to perform computations on encrypted data without exposing it, revolutionizing the way data is used and analyzed. In this episode, the group discusses the challenges in the current data landscape, the importance of security and privacy, and the potential impact of duality's solutions in various industries such as finance and healthcare.
Check out Duality’s webinar, Why Data, Privacy, & Security Leaders are Key to Growth & Innovation
Impactful Moments: 00:00 - Introduction 01:09 - What is homomorphic encryption? 04:03 - Misconceptions of security and privacy 06:25 - What is Duality’s mission? 10:04 - Does Google Drive use homomorphic encryption? 13:08 - What homomorphic encryption enables 22:08 - Innovations that Duality is working on 24:37 - Secure data analytics and Homomorphic encryption 31:41 - Impact of AI and LLMs on security and privacy
Links: Stay in touch with Derek Wood on LinkedIn: https://www.linkedin.com/in/drwood/
Learn more about Duality Technologies: https://dualitytech.com/ Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio.com Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord
Recent Episodes
Debt vs. Risk: What the SharePoint Breach Taught Us with Ron ...
The riskiest move in cybersecurity? Playing it too safe. In this solo episode, Ron Eddings redefines the way we think about technical debt, risk, and missed opportunities, in security and in ...
The Future of Cyber Talent Is African with Confidence Staveley
The world’s youngest continent is also its most untapped resource. Confidence Staveley, Founder of CyberSafe, makes a powerful case for why Africa’s youth are the answer to global cybersecurity ...
Compliance Isn’t the Enemy with Jeff Man
Is compliance just a checkbox, or the backbone of real security? Returning to the show with decades of hard-earned insight, Jeff Man makes the case that compliance, especially PCI-DSS, isn't ...
What Makes a Great CISO? A Playbook from Gary Hayslip
What separates a great CISO from a great one? In this powerhouse conversation, Ron invites friend and cybersecurity leader Gary Hayslip, CISO at SoftBank Investment Advisers, back on the mic to ...
Confidence, Coaching, and the S-Word with Mel Reyes
Want to stand out as a leader? According to our guest Mel Reyes, you need to dress like you mean it and speak like you’ve got nothing to prove. In this episode, Mel shares how he built ...
Purple Teaming Is the New Job Security with Maril Vernon
Cybersecurity isn’t just red or blue anymore... it’s purple, white, and deeply human. Maril Vernon, award-winning ethical hacker and Senior Solutions Architect at NetSPI, returns to the Hacker ...
The AI Gold Rush in Cybersecurity with Chris Cochran
The new cybersecurity pioneers aren’t chasing alerts, they’re building with AI. But what happens when tools meant to assist begin making decisions for us? And what skills do we lose when ...
The AI That Tried to Escape with Ron Eddings
What happens when AI refuses to be replaced? This episode kicks off with a chilling real-world example of an AI threatening blackmail—and only gets more intense from there. Host Ron Eddings ...
Zero Trust Isn’t a Tool — It’s Everything with George Finney
What if Zero Trust isn’t a framework, but the only viable cybersecurity strategy—more about people than products? In this episode, George Finney, CISO at the University of Texas System and ...
Your Two-Year Edge Starts Now with Marco Figueroa
You won’t be replaced by AI—you’ll be replaced by someone using it better. Returning guest Marco Figueroa is back with a frontline report on the AI agent boom. This isn’t a prediction—it’s a ...
WORK WITH US
PODCASTS + SPEAKING + EVENTS
Are you the best kept secret in cybersecurity? Let's change that by partnering together for podcast ads, social campaigns, and your next event or keynote. Send us your details to get started.
Thank you!
We will be in touch soon and reach out to you at