• Latest
  • Trending
3 Questions Answered About Confidential Computing

3 Questions Answered About Confidential Computing

December 27, 2021
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023
How Your Storage System Will Still Be Viable in 5 Years’ Time?

How Your Storage System Will Still Be Viable in 5 Years’ Time?

February 20, 2023
The Broken Promises From Cybersecurity Vendors

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos

February 20, 2023
Instagram and Facebook to get paid-for verification

Instagram and Facebook to get paid-for verification

February 20, 2023
YouTube CEO Susan Wojcicki steps down after nine years

YouTube CEO Susan Wojcicki steps down after nine years

February 20, 2023
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Friday, 23 May, 2025
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

3 Questions Answered About Confidential Computing

by ITECHNEWS
December 27, 2021
in Leading Stories, Opinion
0 0
0
3 Questions Answered About Confidential Computing

YOU MAY ALSO LIKE

ATC Ghana supports Girls-In-ICT Program

Vice President Dr. Bawumia inaugurates ICT Hub

As it stands, confidential computing – the ability to protect data and applications in use by running them within secure enclaves – may come across as the next tech-industry buzzword that only the most embedded professionals understand. Unfortunately, that’s roughly half true. In reality, confidential computing is already at the forefront of several groundbreaking use cases. That said, the concept isn’t yet prevalent due partly to a lack of knowledge around what it is, what it does and how it works.

Organizations need a new approach in today’s environment where rising security concerns and high-visibility attacks collide with the “go faster” push to cloud and DevOps. Enter confidential computing, where security makes business faster and makes work possible that previously seemed impossible. In fact, it has the potential to arm security teams with the power to solve problems that the business didn’t think were solvable.

So, What Is Confidential Computing?

The best way to protect it in an increasingly data-driven world is to rely on a method that focuses on the data itself. On a basic level, data can exist in three states. When it’s stored, it’s “at rest”; when it’s being processed, it’s “in use”; and when it’s traveling across the network, it’s “in transit.” Today’s security best practices use encryption to protect data when it’s at rest or in transit across the network. That data, however, is still vulnerable to unauthorized access and tampering while it’s being processed or at runtime. Therefore, protecting the data while in use is critical for complete security across the data’s lifecycle.

Confidential computing protects data and the applications that process that data by running them in secure enclaves that isolate both data and code to prevent unauthorized access – even if the compute infrastructure has been compromised. Confidential computing does this using hardware-based trusted execution environments (TEE) that uses hardware-backed techniques for increased guarantees of security for code execution and data protection within that environment.

What Can I Do With Confidential Computing?

Confidential computing is already demonstrating its potential in several innovative use cases. For one, Leidos is using it to create a distributed network of trusted computing environments to speed up the clinical drug trial process. With privacy and security concerns abound, Leidos cannot facilitate sharing critical data in real-time while also meeting strict compliance regulations. The technology is already helping speed up getting new drugs to market in a more cost-effective manner.

“Confidential computing is already demonstrating its potential in several innovative use cases”

Meanwhile, Consilient uses the technology to fight financial fraud with machine learning and a confidential computing model that enables AI training without centralizing data. On a practical level, this means that government organizations and financial institutions can predict malicious activity more accurately and efficiently, lowering false-positive rates and making risk management more effective for legitimate businesses.

Finally, there’s the UC San Francisco Center for Digital Health Innovation’s effort to accelerate the development and validation of clinical algorithms. In healthcare, securing regulatory approval for clinical artificial intelligence (AI) algorithms requires highly diverse and detailed clinical data – it’s the only way to develop, optimize and validate unbiased algorithm models. For example, algorithms used to deliver healthcare must perform consistently across diverse patient populations, socioeconomic groups and geographic locations while also remaining equipment-agnostic.

Organizations can run sensitive applications and data on untrusted infrastructure such as public clouds and other hosted environments with hardware-level encryption. This vastly improves control over the security and privacy of applications and data inside and outside of their established security perimeter and can prevent networks from becoming compromised. Let’s be blunt: organizations need to encrypt their data and take care of their keys; otherwise, someone else will.

When Can I Start Using Confidential Computing?

As the above example from UCSF shows, the short answer to this question is “now.” However, in addition to using it to secure healthcare AI, there are already several other practical use cases. This includes protecting in-use data for machine learning models, securing blockchain and providing secure and anonymous analytics on multiple data sets.

One macro trend that just about every organization wants to tackle is using the mountains of data it collects. For most, siloed data is incomplete and only becomes valuable when combined with data from other organizations. At the same time, a lot of data is confidential, meaning there needs to be controls in place.

This creates a tradeoff between security and usability. Organizations need to get at and use data to collaborate with others and unlock insights while also keeping it secure. It can be a tall order with so many moving parts in play, but confidential computing makes it a reality.

The bottom line: data is the new gold, but how are organizations mining it? In the end, as confidential computing as a technology becomes more widespread and innovation increases, organizations will find creative and useful ways to put their data to work, ultimately making it more valuable.

Source: Ambuj Kumar Fortanix co-founder and CEO
Tags: ALSecurity
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023

Recent News

  • ATC Ghana supports Girls-In-ICT Program April 25, 2023
  • Vice President Dr. Bawumia inaugurates ICT Hub April 2, 2023
  • Co-Creation Hub’s edtech accelerator puts $15M towards African startups February 20, 2023
  • Data Leak Hits Thousands of NHS Workers February 20, 2023
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version