What is Confidential Computing?
Confidential Computing is a leading-edge security technology that encrypts sensitive data in use in a public cloud, private cloud or on-premises. It completes the data security triangle since data at rest (in storage) and in transit (across networks)...October 26, 2022 | By Profian
Attestation versus authentication: how to synthesize temporary identity
Confidential Computing is charting new territory in the digital world by chaining attestation and authentication, something which has been known to the legal system for centuries. At Profian, we are familiar with the concept of authentication. We do...January 18, 2023 | By Dmitri Pal
The role of Confidential Computing in a Zero Trust architecture
Recently, someone asked me about the relationship between Confidential Computing and Zero Trust at the Supercomputing conference in Dallas. In the past, the protection of enterprise assets was perimeter based. Users and data were inside and trusted, bad...January 5, 2023 | By Dmitri Pal
Predictions for powerful WebAssembly in 2023
There’s been a flurry of articles over the past few weeks (here and here) about WebAssembly (often shortened to Wasm) and its future in cloud Computing. This may come as something of a surprise to those who know...December 22, 2022 | By Mike Bursell
What are confidential VMs?
If you are keeping up with the latest technology in cloud computing-related security, you have probably seen that several Cloud Service Providers (CSPs) have announced “confidential VMs” as part of their Confidential Computing offering. So, what exactly is...December 19, 2022 | By Profian
Profian joins the Red Hat Technology Partner Ecosystem
For those who have been following our journey, you already know that Profian’s roots are as fedora-wearing and open-source-loving as they come. Our co-founders, Mike Bursell, CEO, and Nathaniel McCallum, CTO, are former Red Hat associates. Enarx, the open...December 13, 2022 | By Jen Wike Huger
Remote attestation: A Confidential Computing best practice or necessity?
If you’re interested in Confidential Computing to encrypt data and applications in use, then you must be interested in attestation, because, without it, you’re not doing Confidential Computing right. Specifically, without attestation, you really don’t have the documented...November 29, 2022 | By Profian
Top 4 reasons IT security teams have to be thankful this holiday season
War, inflation, layoffs – if we let it, reading the news can often consume us and drag us down. For a change of perspective, we at Profian thought it would be timely to counter the negative headlines by...November 21, 2022 | By Profian
3 steps to create a security framework
Hint: Be wary about policies in a vacuum “We need a policy on that.” This is a phrase that seems to act as a universal panacea to too many managers. When a problem is identified, and the blame...October 27, 2022 | By Mike Bursell
Top 5 professional development tips for IT Security
Whether you are looking to get started or are already well down the path of an IT security career, continuous learning should be top-of-mind to keep your skills fresh and your confidence high. The good news is that...October 26, 2022 | By Mike Bursell