Is my data secure while I’m using it? Is it protected every step of the way?
In this Cyber Security Inside What That Means video, Camille breaks down and defines confidential computing with Amy Santoni, Intel Fellow, Design Engineering Group, and Chief Xeon Security Architect, Datacenter Processor Architecture.
You’ll learn:
- What confidential computing is and why it is important.
- Why confidential computing is a focus of cybersecurity development right now.
- What a trusted execution environment is.
- What to put in a trusted execution environment and what data is safe to stay out.
- And more!
Check it out. For more information, previous podcasts, and full versions, visit our website at https://intechnology.intel.com
#ConfidentialComputing #data #cybersecurity
—–
If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms.
Apple Podcast: https://podcasts.apple.com/us/podcast/cyber-security-inside-podcast/id1526572021
Spotify: https://open.spotify.com/show/6RN4ATo5ZDGvgaEj8rLep7?si=EQyu5_A0RvaEDGMdmiiRug
Follow our hosts Tom Garrison and Camille Morhardt:
Tom: @tommgarrison
Camille: @morhardt
Learn more about Intel Cybersecurity:
https://www.intel.com/content/www/us/en/security/overview.html
Intel Compute Life Cycle (CLA):
https://www.intel.com/content/www/us/en/security/compute-lifecycle-assurance.html