The next stage of cloud cybersecurity is known as confidential computing. A core element of the approach is making sure data is protected and encrypted against potential risks from underlying malicious hardware. Additionally, confidential computing offers the promise of providing an additional layer of protection against malicious insiders, network vulnerabilities, and compromised operating systems. Computer Weekly brought this interesting information to our attention in their article, “What is confidential computing?”
Across industries, computing is moving to span multiple environments, from on-premise to public cloud to edge. As companies move these workloads to different environments, they need protection controls.
Confidential computing will enable encrypted data to be processed in memory without exposing it to the rest of the system and reduce exposure for sensitive data and this will provide greater control and transparency for users.
Confidential computing isn’t just a theoretical concept for Google either. Google has been developing an open-source effort called Asylo, which provides a software development framework to help integrate the core concepts of confidential computing.
Melody K. Smith
Sponsored by Data Harmony, a unit of Access Innovations, the world leader in indexing and making content findable.