Skip to content

Confidential Computing: Protecting Data at Every Point | Intel Technology

Play Video

Is my data secure while I’m using it? Is it protected every step of the way?

In this Cyber Security Inside What That Means video, Camille breaks down and defines confidential computing with Amy Santoni, Intel Fellow, Design Engineering Group, and Chief Xeon Security Architect, Datacenter Processor Architecture.

You’ll learn: 

  • What confidential computing is and why it is important.
  • Why confidential computing is a focus of cybersecurity development right now.
  • What a trusted execution environment is.
  • What to put in a trusted execution environment and what data is safe to stay out.
  • And more!

Check it out. For more information, previous podcasts, and full versions, visit our website at https://intechnology.intel.com  

#ConfidentialComputing #data #cybersecurity

—–

If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms.

Apple Podcast: https://podcasts.apple.com/us/podcast/cyber-security-inside-podcast/id1526572021 

Spotify: https://open.spotify.com/show/6RN4ATo5ZDGvgaEj8rLep7?si=EQyu5_A0RvaEDGMdmiiRug 

 

Follow our hosts Tom Garrison and Camille Morhardt:

Tom: @tommgarrison

Camille: @morhardt

 

Learn more about Intel Cybersecurity:

https://www.intel.com/content/www/us/en/security/overview.html 

Intel Compute Life Cycle (CLA):

https://www.intel.com/content/www/us/en/security/compute-lifecycle-assurance.html