All posts by Profian

What are confidential VMs?
What are confidential VMs?
If you are keeping up with the latest technology in cloud computing-related security, you have probably seen that several Cloud Service Providers (CSPs) have announced “confidential VMs” as part of their Confidential Computing offering. So, what exactly is...
December 19, 2022 | By Profian
Remote attestation: A Confidential Computing best practice or necessity?
Remote attestation: A Confidential Computing best practice or necessity?
If you’re interested in Confidential Computing to encrypt data and applications in use, then you must be interested in attestation, because, without it, you’re not doing Confidential Computing right. Specifically, without attestation, you really don’t have the documented...
November 29, 2022 | By Profian
Top 4 reasons IT security teams have to be thankful this holiday season
Top 4 reasons IT security teams have to be thankful this holiday season
War, inflation, layoffs – if we let it, reading the news can often consume us and drag us down. For a change of perspective, we at Profian thought it would be timely to counter the negative headlines by...
November 21, 2022 | By Profian
Featured
What is Confidential Computing?
What is Confidential Computing?
Confidential Computing is a leading-edge security technology that encrypts sensitive data in use in a public cloud, private cloud or on-premises. It completes the data security triangle since data at rest (in storage) and in transit (across networks)...
October 26, 2022 | By Profian
Solving a Confidential Computing Pain Point with WebAssembly
Solving a Confidential Computing Pain Point with WebAssembly
Back when they worked at Red Hat, Mike Bursell and Nathaniel McCallum grappled with the challenges of confidential computing — isolating an organization’s most sensitive data in a secure enclave while processing it. Confidential computing is of particular...
The Next Frontier for Data Security: Protecting Data in Use
The Next Frontier for Data Security: Protecting Data in Use
Tremendous progress has been made over the last several years to protect sensitive data in transit and in storage. But sensitive data may still be vulnerable when it is in use. Author(s): Walid Rjaibi Source: IBM Security Intelligence...
Confidential Computing Startup Profian Secures $5 Million In Seed Round in Order to Make Cloud Computing More Secure
Confidential Computing Startup Profian Secures $5 Million In Seed Round in Order to Make Cloud Computing More Secure
Profian, a Confidential Computing platform focused on bespoke open source solutions, announced today that it has secured $5 million in seed funding. Source: Business Wire Link: https://www.businesswire.com/news/home/20210930005465/en/Confidential-Computing-Startup-Profian-Secures-5-Million-In-Seed-Round-in-Order-to-Make-Cloud-Computing-More-Secure
What Is WebAssembly
What Is WebAssembly
Although WebAssembly brings languages other than HTML, CSS and JavaScript to the browser, it’s not a JavaScript replacement and it takes a very different approach from Flash, Active X plugins and other techniques that encapsulated non-web code for...
Confidential Computing
Confidential Computing
Confidential computing technology protects data during processing. Exclusive control of encryption keys delivers stronger end-to-end data security in the cloud. Author(s): Nataraj Nagaratnam Source: IBM Cloud Learn Hub Link: https://www.ibm.com/cloud/learn/confidential-computing
Confidential Computing—the emerging paradigm for protecting data in-use
As computing moves to span multiple environments—from on-prem to public cloud to edge computing—organizations need security controls that can safeguard sensitive intellectual property (IP) and workload data wherever the data resides. Highly regulated applications and mission critical applications...