Confidential computing archives

2 posts from October 2022

Confidential computing in public clouds: isolation and remote attestation explained

By ijlal-loutfi, 31 October 2022

In the first part of this blog series, we discussed the run-time (in)security challenge, which can leave your code and data vulnerable to attacks by both the...

What is confidential computing? A high-level explanation for CISOs

By ijlal-loutfi, 11 October 2022

Privacy enhancing technologies and confidential computing are two of my favorite topics to talk about! So much so that I am writing this blog post on a sunny...