All posts by Dmitri Pal

Attestation versus authentication: how to synthesize temporary identity
Attestation versus authentication: how to synthesize temporary identity
Confidential Computing is charting new territory in the digital world by chaining attestation and authentication, something which has been known to the legal system for centuries. At Profian, we are familiar with the concept of authentication. We do...
January 18, 2023 | By Dmitri Pal
The role of Confidential Computing in a Zero Trust architecture
The role of Confidential Computing in a Zero Trust architecture
Recently, someone asked me about the relationship between Confidential Computing and Zero Trust at the Supercomputing conference in Dallas. In the past, the protection of enterprise assets was perimeter based. Users and data were inside and trusted, bad...
January 5, 2023 | By Dmitri Pal