Evaluating Privacy Enhancing Technologies: Key Considerations for Security and Audit

Cyber lock with a key hole
Author: Ayanda Mthimkhulu, Kimentha Govender, Lerato Riba, Muhammed Loonat, and Nande Mbixo
Date Published: 1 November 2025
Read Time: 12 minutes
Related: Exploring Practical Considerations and Applications for Privacy Enhancing Technologies

Privacy enhancing technologies (PETs) have emerged as crucial solutions for protecting personal and sensitive information in a landscape characterized by extensive data breaches, surveillance concerns, and rapidly evolving data protection regulations. As enterprises continue to collect massive amounts of data, the need to secure digital systems...

 

Members, login to keep reading.

Not a member but want to read more?
Explore ISACA member benefits today.