Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Why Compromised Credentials Are the #1 Attack Vector in 2024

June 15, 2025

Anubis Ransomware Unleashes File-Wiping Fury

June 14, 2025

WestJet Faces Cyberattack Disrupting Operations

June 14, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » csky.ai and DuoKey Launch Secure AI Transcription Solution for Microsoft 365
Solutions & Tech

csky.ai and DuoKey Launch Secure AI Transcription Solution for Microsoft 365

Staff WriterBy Staff WriterJune 12, 2025No Comments3 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Edge AI processing with Double Key Encryption addresses enterprise privacy concerns for confidential meeting transcription

csky.ai and DuoKey announced at Vivatech the launch of their integrated secure transcription solution for Microsoft 365. The solution combines csky.ai’s offline AI transcription technology with DuoKey’s Double Key Encryption (DKE) to enable organisations to transcribe confidential meetings while maintaining complete control over sensitive data in the Microsoft cloud.

The solution processes meeting transcriptions entirely offline using csky.ai’s ClearMind device, which runs a large language model locally without internet connectivity. This edge computing approach means sensitive audio never leaves the organisation’s premises during transcription. The system can transcribe meetings in real-time, generate enterprise grade minutes in existing organization word templates, agenda point by agenda point and identify people in conversations while operating completely disconnected from external networks. “In a world where trust and privacy are non-negotiable, our solution empowers leadership teams to collaborate, decide, and move faster, without compromising data control,” said Hugo Flayac, CEO at csky.ai.

Cyber Technology Insights : LevelBlue Agrees to Acquire Aon’s Cybersecurity and IP Litigation Consulting Groups

DuoKey’s encryption system then secures the transcripts locally using Double Key Encryption (DKE) before storage in Microsoft 365. This method requires two separate encryption keys for data access — one stored in Microsoft Azure Key Vault and another managed through DuoKey’s external key management system. The external key management incorporates Multi-Party Computation to distribute key control across multiple secure locations, preventing any single entity from compromising the encryption key.

Organisations can now transcribe board meetings, legal consultations, strategic planning sessions and other confidential discussions without exposing sensitive to third-party services and cloud servers. The offline processing eliminates the exposure risks typically associated with cloud-based AI transcription services, while the double key encryption ensures that neither Microsoft nor unauthorised users can access the stored transcripts.

Cyber Technology Insights : Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

“Our encryption solution ensures that confidential transcripts are never exposed to cloud-based servers — including Microsoft,” said Nagib Aouini, CEO at DuoKey. “Businesses can really benefit from AI transcription capabilities while maintaining the same level of productivity without compromising data security.”

The solution addresses compliance requirements for GDPR, HIPAA, and CCPA by keeping data processing on-premises and providing cryptographic controls over stored information. Legal and healthcare organizations, financial institutions, and companies handling intellectual property can use the system to maintain audit trails and meeting records without compromising confidentiality.

Cyber Technology Insights : Keeper Security Named Overall Leader on GigaOm Radar Report

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com

Source: prnewswire



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleConfronting the Growing Security Threat: Essential Strategies
Next Article Bridge Achieves Enhanced Platform Security With SOC and ISO Compliance
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Adeel Shaikh Releases Updated Book on AI-Driven SOC Shif

June 14, 2025

Glider AI Launches ID Verify to Tackle Hiring Fraud Risks

June 14, 2025

SutiSign Boosts eSignature Security with Smart ID Verificatio

June 14, 2025
Leave A Reply Cancel Reply

Latest Posts

Anubis Ransomware Unleashes File-Wiping Fury

June 14, 20250 Views

WestJet Faces Cyberattack Disrupting Operations

June 14, 20250 Views

Outage Unrelated to Security: Your Data Remains Safe!

June 13, 20250 Views

Google Links Major Cloud Outage to API Management Glitch

June 13, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Why Compromised Credentials Are the #1 Attack Vector in 2024

June 15, 2025

Anubis Ransomware Unleashes File-Wiping Fury

June 14, 2025

WestJet Faces Cyberattack Disrupting Operations

June 14, 2025
Most Popular

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20254 Views

SonicWall SMA 1000 series appliances left exposed on the internet

February 14, 20254 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.