Cybersecurity

Raphaël Millet
Members Public

Mithril x Tramscribe: Confidential LLMs for medical voice notes analysis

How we partnered with Tramscribe to leverage LLMs deal with Medical voice notes analysis

Corentin Lauverjat
Members Public

Identifying a critical attestation bypass vulnerability in Apache Teaclave

This vulnerability can be used to mount a Man in the Middle attack. We found a fix, that Teaclave implemented following the release of this article.

Raphaël Millet
Members Public

Mithril x Avian: Zero Trust Digital Forensics and eDiscovery

How we partnered with Avian to deploy sensitive Forensic services thanks to Zero Trust Elastic search.

Charles Chudant
Members Public

Jupyter Notebooks Are Not Made for Sensitive Data Science Collaboration

When collaborating remotely on sensitive data, their usually amazing interactivity and flexibility need safeguards, or whole datasets can be extracted in a few lines of code.

Daniel Huynh
Members Public

Mithril Security joins the Confidential Computing Consortium

Mithril Security joins the Confidential Computing Consortium to accelerate open-source privacy friendly AI

Daniel Huynh
Members Public

Confidential computing explained. Part 3: data in use protection

Deep dive into the data-in-use protection mechanisms of secure enclaves