Blog

Featured
What is Confidential Computing?
What is Confidential Computing?
Confidential Computing is a leading-edge security technology that encrypts sensitive data in use in a public cloud, private cloud or on-premises. It completes the data security triangle since data at rest (in storage) and in transit (across networks)...
October 26, 2022 | By Profian
Remote attestation: A Confidential Computing best practice or necessity?
Remote attestation: A Confidential Computing best practice or necessity?
If you’re interested in Confidential Computing to encrypt data and applications in use, then you must be interested in attestation, because, without it, you’re not doing Confidential Computing right. Specifically, without attestation, you really don’t have the documented...
November 29, 2022 | By Profian
Top 4 reasons IT security teams have to be thankful this holiday season
Top 4 reasons IT security teams have to be thankful this holiday season
War, inflation, layoffs – if we let it, reading the news can often consume us and drag us down. For a change of perspective, we at Profian thought it would be timely to counter the negative headlines by...
November 21, 2022 | By Profian
3 steps to create a security framework
3 steps to create a security framework
Hint: Be wary about policies in a vacuum “We need a policy on that.” This is a phrase that seems to act as a universal panacea to too many managers. When a problem is identified, and the blame...
October 27, 2022 | By Mike Bursell
Top 5 professional development tips for IT Security
Top 5 professional development tips for IT Security
Whether you are looking to get started or are already well down the path of an IT security career, continuous learning should be top-of-mind to keep your skills fresh and your confidence high. The good news is that...
October 26, 2022 | By Mike Bursell
Why Profian joined the CNCF
Why Profian joined the CNCF
Security startup becomes part of the Cloud Native Computing Foundation (CNCF) The CNCF is a giant in the tech and computing community, and we’re honored to be a member. At the Silver level, we have the opportunity to...
September 28, 2022 | By Jen Wike Huger
How to test more complex workloads with Enarx
How to test more complex workloads with Enarx
New! Pre-complied example applications In a previous article, Confidential Computing: try it now, for free, we introduced our self-service demo site, try.enarx.dev.  You can find out more about what the service offers and why we think it’s so...
September 23, 2022 | By Mike Bursell
Confidential Computing: try it now, for free
Confidential Computing: try it now, for free
Go to try.enarx.dev Since we were founded in June 2021, we at Profian have been working to bring Confidential Computing to the market in a new way. We believe it should be simple and quick to deploy applications...
August 8, 2022 | By Mike Bursell
Solving a Confidential Computing Pain Point with WebAssembly
Solving a Confidential Computing Pain Point with WebAssembly
Back when they worked at Red Hat, Mike Bursell and Nathaniel McCallum grappled with the challenges of confidential computing — isolating an organization’s most sensitive data in a secure enclave while processing it. Confidential computing is of particular...
Socket_accept and more on WASI networking today
Socket_accept and more on WASI networking today
Nathaniel McCallum and Harald Hoyer present “WASI Networking: Towards a World Wide WebAssembly” at Wasm Day + KubeCon + CloudNativeCon 2022. Learn why we drove the addition of socket_accept to WASI networking, what the most recent developments are...
May 24, 2022 | By Nathaniel McCallum