Security Training

Continuous learning is key for personal development and system security.

Some of our Articles

Standardising Confidential Computing

Standardising Confidential Computing

Trusted Execution Environments have been around for a while now and keep evolving. As support for confidential computing is included in more commodity platform, standardising this approach is becoming increasingly important to accelerate updake. This is part one of a...

read more
Intel SGX vs TDX: what is the difference?

Intel SGX vs TDX: what is the difference?

Intel has been a pioneer in Confidential Computing by introducing Software Guard Extensions - better known as SGX - as early as 2013. It continues this trend with the upcoming Trusted Domain Extensions or TDX. But when it comes to Intel SGX vs Intel TDX, what is the...

read more
Security of Confidential Computing in Open Infrastructure

Security of Confidential Computing in Open Infrastructure

Confidential computing isolates data and code in a secure domain during processing. This secure domain - also called a  Trusted Execution Environment - is created using a combination of firmware and hardware features. In this post, we review the security...

read more
What is Confidential Computing and Why Should I Care?

What is Confidential Computing and Why Should I Care?

Individuals and enterprises all around the globe are widely using cloud computing. It allows seamless data access across multiple devices, collaborative work and centralised data storage. However, using the cloud means a compromise in terms of data privacy, control...

read more

Need help?

We will be happy to show you the benefits of Confidential Computing and guide you through cybersecurity best practices!