Our Articles
Security Considerations of Confidential Computing in Open Infrastructure
Confidential computing enables isolation of sensitive data in a secure domain during processing. It protects data in use by running the computation in a Trusted Execution Environment created using a combination of firmware and hardware features. While the approach...
Paper review: Confidential Computing for OpenPOWER
This year's EuroSys conference included in its programme several papers with significant contributions to the growing field of Confidential Computing. In this blog post we will review Confidential Computing for OpenPOWER by Hunt et al, describing the design and...
Review of the ENISA cybersecurity cloud-certification scheme
Just days before the end of 2020, the European Union Network and Information Security Agency (ENISA) launched a public consultation on a new draft candidate cybersecurity certification scheme. ENISA's primary stated goal with this is to "enhance trust in cloud...
Review of Confidential VMs in Google Cloud Platform
Google has recently announced the introduction of Confidential VMs as first, beta product in the Confidential Computing ecosystem. The new concept of Google's Confidential VMs builds on top of the existing shielded VMs technology and adds a layer of security to the...
What is confidential computing and why should I care?
Cloud computing is widely used by individuals and organisations alike. It allows seamless data access across multiple devices, collaborative work and centralised data storage. However, using the cloud means a compromise in terms of data privacy, control over data...
Need help?
We will be happy to show you the benefits of Confidential Computing and guide you through cybersecurity best practices!