What Is Confidential Computing?
Big tech companies are adopting a new security model called confidential computing to protect data while it’s in use Author(s): Fahmida Y Rashid Source: IEEE Spectrum Link:
Stepping WebAssembly up a notch with security
Wasm offers the sort of platform-independence and easy integration that security-conscious developers and enterprises are looking for. Author(s): Mike BursellSource: Opensource.comLink:
Current Trusted Execution Environment landscape
If you run software on someone’s servers, you have a problem. You can’t be sure your data and code aren’t being observed, or worse, tampered with — trust is your only assurance. But there is hope, in the...
Confidential computing – The next new norm
The Linux Foundation recently formed the Confidential Computing Consortium, a community dedicated to defining and accelerating the adoption of confidential computing. Red Hat and other organizations deeply interested in breathing life into confidential computing solutions are coming together...
Intel, IBM, Google, Microsoft & others join new security-focused industry group
Some of the biggest names in the cloud and hardware ecosystem have agreed to join a new industry group focused on promoting safe computing practices. Founding members include Alibaba, Arm, Baidu, Google Cloud, IBM, Intel, Microsoft, Red Hat,...
Trust No One, Run Everywhere–Introducing Enarx
When you run a workload as a VM, container or in a serverless environment, that workload is vulnerable to interference by any person or software with hypervisor, root or kernel access.  Enarx, a new open source project,  aims...
Announcing Enarx for running sensitive workloads
Enarx leverages the capabilities of a TEE to change the trust model for your application. Author(s): Mike BursellSource: Opensource.comLink: