Solving a Confidential Computing Pain Point with WebAssembly
Solving a Confidential Computing Pain Point with WebAssembly
Back when they worked at Red Hat, Mike Bursell and Nathaniel McCallum grappled with the challenges of confidential computing — isolating an organization’s most sensitive data in a secure enclave while processing it. Confidential computing is of particular...
The Next Frontier for Data Security: Protecting Data in Use
The Next Frontier for Data Security: Protecting Data in Use
Tremendous progress has been made over the last several years to protect sensitive data in transit and in storage. But sensitive data may still be vulnerable when it is in use. Author(s): Walid Rjaibi Source: IBM Security Intelligence...
What Is WebAssembly
What Is WebAssembly
Although WebAssembly brings languages other than HTML, CSS and JavaScript to the browser, it’s not a JavaScript replacement and it takes a very different approach from Flash, Active X plugins and other techniques that encapsulated non-web code for...
Confidential Computing
Confidential Computing
Confidential computing technology protects data during processing. Exclusive control of encryption keys delivers stronger end-to-end data security in the cloud. Author(s): Nataraj Nagaratnam Source: IBM Cloud Learn Hub Link: https://www.ibm.com/cloud/learn/confidential-computing
Confidential Computing—the emerging paradigm for protecting data in-use
As computing moves to span multiple environments—from on-prem to public cloud to edge computing—organizations need security controls that can safeguard sensitive intellectual property (IP) and workload data wherever the data resides. Highly regulated applications and mission critical applications...
Top 10 Digital Transformation Trends For 2021
Privacy and Confidential Computing Gains Momentum. Another approach to shoring up cybersecurity, particularly when addressing communications and data privacy, is confidential computing. The idea of confidential computing is to encrypt the entire computing process, not just the data,...
Top Actions From Gartner Hype Cycle for Cloud Security, 2020
Confidential computing — one of 33 technologies on the Gartner Hype Cycle for Cloud Security, 2020 — is a security mechanism that protects code and data from the host system. By making critical information invisible to third parties,...
Why we open sourced our security project
When Nathaniel McCallum and I embarked on the project that is now called Enarx, we made one decision right at the beginning: the code for Enarx would be open source, a stance fully supported by our employer, Red...
What Is Confidential Computing?
Big tech companies are adopting a new security model called confidential computing to protect data while it’s in use Author(s): Fahmida Y Rashid Source: IEEE Spectrum Link: https://spectrum.ieee.org/what-is-confidential-computing
Stepping WebAssembly up a notch with security
Wasm offers the sort of platform-independence and easy integration that security-conscious developers and enterprises are looking for. Author(s): Mike BursellSource: Opensource.comLink: https://opensource.com/article/20/5/wasm-security