Confidential Computing Consortium Adds End User Advisory Council
Being able to encrypt data while it’s actually being used has always been a challenge. After all, people and systems need to see information in order to use it. For years, security ...
Why We Need to Cultivate a Confidential Computing Ecosystem
The development of privacy-enhancing technologies (PETs) can resolve the tension between data privacy and utility ...
Confidential Computing: Guardian of Privacy in the Big Data Era
The Future of Data Protection: The Emergence of Confidential Computing In today’s information age, data has become an invaluable resource ubiquitous across various sectors, from financial institutions to healthcare and scientific research ...
Confidential Computing: A Revolution in Sensitive Data Security
While robust measures are available to businesses wanting to protect their most sensitive data assets, there are still circumstances in which those assets can be left exposed. Full data confidentiality depends on ...
Anjuna Closes Long Existing Enterprise Data Security Gap
Anjuna Enterprise Enclaves™ build on industry momentum and new CPU technology to lay groundwork for new era of secure computing PALO ALTO CA — A new industry-driven approach provides enterprise CIOs ...
Intel Highlights Latest Security Investments at RSA 2020
SAN FRANCISCO, Feb. 26, 2020 – At the Intel Security Day event during RSA Conference 2020, Intel underscored its commitment to security with several announcements, including details on security capabilities coming in ...
The State of Ransomware 2024
BlackFog's state of ransomware report measures publicly disclosed and non-disclosed attacks globally ...
What Is An Advanced Persistent Threat (APT)?
Modern threats are evolving rapidly in both scope and scale. Hackers are targeting governments and businesses alike with increasing sophistication. What is an APT? It’s a complex, long-term attack against an IT ...
DMTF Shares Industry Support for its Platform Security Standards
PORTLAND, Ore. – January 11, 2022 – DMTF today announced that its Security Protocol and Data Model (SPDM) specifications have garnered industry support and are actively helping to solve customer and end ...
Operation GhostShell: Novel RAT Targets Global Aerospace and Telecoms Firms
In July 2021, the Cybereason Nocturnus and Incident Response Teams responded to Operation GhostShell, a highly-targeted cyber espionage campaign targeting the Aerospace and Telecommunications industries mainly in the Middle East, with additional ...