Articles
The latest topics on Confidential Computing and other Privacy Enhancing Technologies (PETs)
Insights
The Golden Age of Data Owners
The Promise of AI Throughout the past months, generative AI has taken by storm the minds of decision makers and practitioners alike. It is finding its way into corporate strategy documents. The AI cornucopia is churning out hundreds upon hundreds of start-ups that...
Preparing for DORA – a new challenge for financial entities
Preparations underway The Digital Operational Resilience Act (DORA), establishes the European Union’s new regulatory framework for the management of digital risks in financial markets. You can get a PDF of the regulation from the EU commission website. It entered into...
Facilitating secure data sharing in the energy sector
The European Union’s new Data Act provides a harmonized framework for data sharing. It enables innovation and unlocks the possibility of collaborative projects towards a more sustainable and efficient energy sector. But how to share data without posing security risks...
Mitigating the Risk of Cyberattacks to Energy Systems
Technology vendors supplying critical infrastructure face substantial risks: they stand as prime targets for cyberattacks, being prominent actors in the energy supply chain. The energy sector is particularly vulnerable to cyberattacks as critical infrastructures are...
Standardising Confidential Computing
Trusted Execution Environments have been around for a while now and keep evolving. As support for confidential computing is included in more commodity platform, standardising this approach is becoming increasingly important to accelerate updake. This is part one of a...
Confidential Quartet: comparing confidential computing platforms
Awesome AI start-up offers a proprietary algorithm for voice recognition. Health-hero hospital collected a large set of patient interviews audio recordings; it needs to transcribe and index them to define a new treatment protocol for an elusive rare condition. They...
Intel SGX vs TDX: what is the difference?
Intel has been a pioneer in Confidential Computing by introducing Software Guard Extensions - better known as SGX - as early as 2013. It continues this trend with the upcoming Trusted Domain Extensions or TDX. But when it comes to Intel SGX vs Intel TDX, what is the...
Security of Confidential Computing in Open Infrastructure
Confidential computing isolates data and code in a secure domain during processing. This secure domain - also called a Trusted Execution Environment - is created using a combination of firmware and hardware features. In this post, we review the security...
Confidential Computing on IBM Protected Execution Facility
This year's EuroSys conference included papers with significant contributions to the growing field of Confidential Computing.This blog post reviews Confidential Computing on IBM Protected Execution Facility (PEF). It follows the paper Confidential Computing for...
Review of the ENISA cybersecurity cloud-certification scheme
In December 2020, the European Union Network and Information Security Agency (ENISA) launched a public consultation on a new candidate cybersecurity certification scheme. ENISA's primary goal with this is to "enhance trust in cloud services across Europe". The...
Review of Confidential VMs in Google Cloud Platform
Google Cloud Platform (GCP) recently announced Confidential VMs as first, beta product in the Confidential Computing ecosystem. Google's Confidential VMs build on top of the existing shielded VMs technology. This efforts adds a layer of security to the Google Cloud...
What is Confidential Computing?
Individuals and enterprises all around the globe are widely using cloud computing. It allows seamless data access across multiple devices, collaborative work and centralised data storage. However, using the cloud means a compromise in terms of data privacy, control...