Insights

Insights, articles and latest news for our followers and readers.

Standardising Confidential Computing

Standardising Confidential Computing

Trusted Execution Environments have been around for a while now and keep evolving. As support for confidential computing is included in more commodity platform, standardising this approach is becoming increasingly important to accelerate updake. This is part one of a...

Intel SGX vs TDX: what is the difference?

Intel SGX vs TDX: what is the difference?

Intel has been a pioneer in Confidential Computing by introducing Software Guard Extensions - better known as SGX - as early as 2013. It continues this trend with the upcoming Trusted Domain Extensions or TDX. But when it comes to Intel SGX vs Intel TDX, what is the...

Security of Confidential Computing in Open Infrastructure

Security of Confidential Computing in Open Infrastructure

Confidential computing enables isolation of sensitive data in a secure domain during processing. It protects data in use by running the computation in a Trusted Execution Environment created using a combination of firmware and hardware features. Next, we review the...

Review of the ENISA cybersecurity cloud-certification scheme

Review of the ENISA cybersecurity cloud-certification scheme

In December 2020, the European Union Network and Information Security Agency (ENISA) launched a public consultation on a new candidate cybersecurity certification scheme. ENISA's primary goal with this is to "enhance trust in cloud services across Europe". The...

Review of Confidential VMs in Google Cloud Platform

Review of Confidential VMs in Google Cloud Platform

Google Cloud Platform (GCP) recently announced Confidential VMs as first, beta product in the Confidential Computing ecosystem. Google's Confidential VMs build on top of the existing shielded VMs technology. This efforts adds a...