Putting privacy-enhancing technologies to use
Data can be protected in use without breaking privacy boundaries


As the economy has become increasingly dependent on data, companies have sought to make more profit from mining user actions such as through loyalty schemes or social media interactions.
But individual rights also have to be respected, and businesses have to follow strict data protection procedures.
Privacy-enhancing technologies (PETs) are one method for companies to securely search through data to derive value – for example, a bank could search through customer data to expose fraudulent activity without putting the personal information of all the customers involved at risk.
This episode, Rory and Jane are joined by Ellison Anne Williams, CEO and founder of privacy-enhancing technology company Enveil, to discuss the dos and don’ts of data use, and how organizations can make use of PETs for enhanced data mining.
Highlights
“Gartner predicts that by 2025, you're going to see about 60% of all large organizations globally, leveraging some form of privacy-enhancing technologies for secure data sharing collaboration, monetization etcetera.”
“Now, privacy enhancing technologies uniquely protect data in use, when it's being used or processed, not when the data is sitting at rest in the file system or moving around the network in transit.”
“So when you talk about allowing any type of organization to be able to securely and privately use data across those boundaries or silos, one form of kind of boundary or silo that you can cross for secure and private data sharing and collaboration is that of organization. So for example, bank to bank, or maybe a healthcare entity to another healthcare entity.”
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
“It's equally applicable even down to the consumer level. However, I don't believe that's the way we're going to see adoption actually occur. I think at first it's going to follow a natural kind of innovation technology adoption curve, I believe, which is it will start with very large organizations.”
Footnotes
- What are privacy-enhancing technologies (PETs)?
- What is AES encryption?
- Intel joins forces with DARPA to help build encryption ‘holy grail’
- What is machine learning and why is it important?
- What are the pros and cons of AI?
Subscribe
- Subscribe to The IT Pro Podcast on Apple Podcasts
- Subscribe to The IT Pro Podcast on Google Podcasts
- Subscribe to The IT Pro Podcast on Spotify
- Subscribe to the IT Pro newsletter
- Subscribe to IT Pro 20/20

Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.
In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.
-
Microsoft quietly launched an AI agent that can detect and reverse engineer malware
News Researchers say the tool is already achieving the “gold standard” in malware classification
-
AWS CEO Matt Garman just said what everyone is thinking about AI replacing software developers
News Junior developers aren’t going anywhere, according to AWS CEO Matt Garman
-
Can cyber group takedowns last?
ITPro Podcast Threat groups can recover from website takeovers or rebrand for new activity – but each successful sting provides researchers with valuable data
-
July rundown: Salt Typhoon and SharePoint scares
ITPro Podcast US public sector organizations are under serious threat from the state-backed hacking group
-
Can the UK ban ransomware payments?
ITPro Podcast Attempts to cut off ransomware group profits could instead harm businesses
-
We need to talk about operational technology
ITPro Podcast Groups like Volt Typhoon are abusing poor hygiene in critical infrastructure to pre-position for attacks
-
RSAC Conference 2025: The front line of cyber innovation
ITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event
-
April rundown: MITRE frights and Microsoft launches Recall (again)
ITPro Podcast As CISA delivered an eleventh-hour reprieve for the CVE database, AWS reportedly began to pause some data center leases
-
The new era of cyber threats
ITPro Podcast With AI-powered attacks and state-backed groups, security teams face face a new wave of sophisticated threats
-
Supply chain scares and Google’s AI code
ITPro Podcast As the ransomware attack on Blue Yonder disrupts a wide range of firms, Google moves to lead by example on internal AI code