Cinq lectures dignes d’intérêt: Informatique confidentielle – La voie à suivre en matière de sécurité du cloud

Cinq lectures dignes d’intérêt est une rubrique régulière consacrée à cinq éléments intéressants que nous avons découverts lors de nos recherches sur des sujets tendances ou intemporels. À la lumière des préoccupations croissantes concernant la cybersé… Continue reading Cinq lectures dignes d’intérêt: Informatique confidentielle – La voie à suivre en matière de sécurité du cloud

Five worthy reads: Confidential computing – The way forward in cloud security

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In light of rising concerns over cloud cybersecurity, this week we explore the concept of confidential computing.
The past y… Continue reading Five worthy reads: Confidential computing – The way forward in cloud security

What is confidential computing? How can you use it?

What is confidential computing? Can it strengthen enterprise security? Sam Lugani, Lead Security PMM, Google Workspace & GCP, answers these and other questions in this Help Net Security interview. How does confidential computing enhance the overal… Continue reading What is confidential computing? How can you use it?

New cross-industry consortium aims to accelerate confidential computing adoption

The Linux Foundation announced the intent to form the Confidential Computing Consortium, a community dedicated to defining and accelerating the adoption of confidential computing. Companies committed to this work include Alibaba, Arm, Baidu, Google Clo… Continue reading New cross-industry consortium aims to accelerate confidential computing adoption