confidential computing

Edgeless Systems Brings Confidential Computing to AI
Michael Vizard | | AI, Artificial Intelligence, confidential computing, Edgeless Systems, encryption
Edgeless Systems Continuum platform applies confidential computing to artificial intelligence (AI) workloads to better secure them ...
Security Boulevard
Enhancing trust for SGX enclaves
By Artur Cygan Creating reproducible builds for SGX enclaves used in privacy-oriented deployments is a difficult task that lacks a convenient and robust solution. We propose using Nix to achieve reproducible and ...

Why We Need to Cultivate a Confidential Computing Ecosystem
The development of privacy-enhancing technologies (PETs) can resolve the tension between data privacy and utility ...
Security Boulevard

Oracle Adds Free Confidential Computing Option to Cloud Service
Oracle today added a confidential computing capability to its Oracle Cloud Infrastructure service at no extra cost. The service is based on AMD Secure Encrypted Virtualization (SEV) or AMD Secure Memory Encryption ...
Security Boulevard

Confidential Computing Beats Homomorphic Encryption for Data Security
Ayal Yogev | | cloud computing, confidential computing, data in use, enterprise security, FHE, Homomorphic Encryption
For the enterprise, data is like the air we breathe. At the same time, data seems to be indefensible, with data breaches and intellectual property loss a near certainty. New technologies arrive ...
Security Boulevard
Improving Edge Computing Security in 2022
Tripwire Guest Authors | | Cloud, computing, confidential computing, Distributed Resiliency, edge, SASE, zero trust
More organizations are turning their eyes to edge computing as cloud adoption reaches new heights. Experts predict there will be 55 billion edge devices by 2022 as latency and resilience demands grow ...

Confidential Computing Consortium Adds End User Advisory Council
George V. Hulme | | confidential computing, Confidential Computing Consortium, Data Security, encryption, end user
Being able to encrypt data while it’s actually being used has always been a challenge. After all, people and systems need to see information in order to use it. For years, security ...
Security Boulevard
IBM Moves to Introduce ‘Confidential Computing’ to Adjust to the New Normal
One of the first jobs I got after I joined IBM was in Competitive Analysis. I got the job after doing a several year stint in Internal Audit as part of a ...

Hackers Steal More Than 3TB of Data from Vevo
Lucian Constantin | | certificate revocation, confidential computing, Data breach, Data encryption, data in use, google, Google Chrome, Hyper-V, Intel Software Guard Extensions, Microsoft Azure, Ourmine, ssl certificate, Symamtec, trust revocation, Trusted Execution Environment, Vevo, Virtual Secure Mode
A group of hackers called OurMine has leaked 3.12TB of files belonging to video-hosting service Vevo. The files were obtained after hackers compromised an employee’s account on Okta, a single sign-on service ...