Confidential Quartet: comparing confidential computing platforms

Awesome AI start-up offers a proprietary algorithm for voice recognition. Health-hero hospital collected a large set of patient interviews audio recordings; it needs to transcribe and index them to define a new treatment protocol for an elusive rare condition. They...

Confidential Computing on IBM Protected Execution Facility

This year’s EuroSys conference included papers with significant contributions to the growing field of Confidential Computing. This blog post reviews Confidential Computing on IBM Protected Execution Facility (PEF). It follows the paper Confidential Computing for...

Review of Confidential VMs in Google Cloud Platform

Google Cloud Platform (GCP) recently announced Confidential VMs as first, beta product in the Confidential Computing ecosystem. Google’s Confidential VMs build on top of the existing shielded VMs technology. This efforts adds a layer of security to the Google...

What is Confidential Computing and Why Should I Care?

Individuals and enterprises all around the globe are widely using cloud computing. It allows seamless data access across multiple devices, collaborative work and centralised data storage. However, using the cloud means a compromise in terms of data privacy, control...