Blog

Confidential Computing
Confidential Computing
Confidential computing technology protects data during processing. Exclusive control of encryption keys delivers stronger end-to-end data security in the cloud. Author(s): Nataraj Nagaratnam Source: IBM Cloud Learn Hub Link: https://www.ibm.com/cloud/learn/confidential-computing
Confidential Computing—the emerging paradigm for protecting data in-use
As computing moves to span multiple environments—from on-prem to public cloud to edge computing—organizations need security controls that can safeguard sensitive intellectual property (IP) and workload data wherever the data resides. Highly regulated applications and mission critical applications...
Top 10 Digital Transformation Trends For 2021
Privacy and Confidential Computing Gains Momentum. Another approach to shoring up cybersecurity, particularly when addressing communications and data privacy, is confidential computing. The idea of confidential computing is to encrypt the entire computing process, not just the data,...
Top Actions From Gartner Hype Cycle for Cloud Security, 2020
Confidential computing — one of 33 technologies on the Gartner Hype Cycle for Cloud Security, 2020 — is a security mechanism that protects code and data from the host system. By making critical information invisible to third parties,...
Why we open sourced our security project
When Nathaniel McCallum and I embarked on the project that is now called Enarx, we made one decision right at the beginning: the code for Enarx would be open source, a stance fully supported by our employer, Red...
What Is Confidential Computing?
Big tech companies are adopting a new security model called confidential computing to protect data while it’s in use Author(s): Fahmida Y Rashid Source: IEEE Spectrum Link: https://spectrum.ieee.org/what-is-confidential-computing
Stepping WebAssembly up a notch with security
Wasm offers the sort of platform-independence and easy integration that security-conscious developers and enterprises are looking for. Author(s): Mike BursellSource: Opensource.comLink: https://opensource.com/article/20/5/wasm-security
Current Trusted Execution Environment landscape
If you run software on someone’s servers, you have a problem. You can’t be sure your data and code aren’t being observed, or worse, tampered with — trust is your only assurance. But there is hope, in the...
Confidential computing – The next new norm
The Linux Foundation recently formed the Confidential Computing Consortium, a community dedicated to defining and accelerating the adoption of confidential computing. Red Hat and other organizations deeply interested in breathing life into confidential computing solutions are coming together...
Intel, IBM, Google, Microsoft & others join new security-focused industry group
Some of the biggest names in the cloud and hardware ecosystem have agreed to join a new industry group focused on promoting safe computing practices. Founding members include Alibaba, Arm, Baidu, Google Cloud, IBM, Intel, Microsoft, Red Hat,...