hidden text to trigger early load of fonts ПродукцияПродукцияПродукцияПродукция Các sản phẩmCác sản phẩmCác sản phẩmCác sản phẩm المنتجاتالمنتجاتالمنتجاتالمنتجات מוצריםמוצריםמוצריםמוצרים

"Security" Posts in "Security"

cancel
Showing results for 
Search instead for 
Did you mean: 
120 Discussions
Latest Tagged

2024 Intel Product Security Report Released

The 2024 Intel Product Security Report provides a comprehensive analysis of Intel's product security...
2 Kudos
1 Comments

Intel’s Trust SaaS is now in Limited Availability

Intel’s independent attestation service, code named Project Amber, is now in Limited Availability. ...
3 Kudos
1 Comments

Seamless Attestation of Intel® TDX and NVIDIA H100 TEEs with Intel® Trust Authority

Intel and NVIDIA are collaborating on a Confidential Computing solution for Intel processors with In...
1 Kudos
2 Comments

Verifiable Compute: Enhancing the Accountability of Confidential AI

Intel is driving innovation in Confidential AI from edge to cloud, and EQTY Lab’s Verifiable Compute...
2 Kudos
0 Comments

Intel and Google Cloud Announce Confidential VMs for the Masses

Concerned About Security and Privacy in the Cloud? Intel and Google Cloud Announce Confidential VMs ...
1 Kudos
0 Comments

Intel and Microsoft joint security review of Intel TDX 1.5

In this post we are excited to talk about a joint security review of Intel® Trust Domain Extensions ...
0 Kudos
0 Comments

Real-World Stories: Use Cases from the Confidential Computing Consortium

As a founding member of the Confidential Computing Consortium (CCC), Intel is excited to see the CCC...
1 Kudos
0 Comments

Enhance SecretFlow Cloud Privacy-Preserving solution for LLMs with Intel® TDX

SecreFlowCloud Privacy-Preserving LLM Platform Arctechture run over Intel® TDX
0 Kudos
0 Comments

Enhancing Security at the Edge - Intel® Software Guard Extensions (Intel® SGX) and Gramine Overview

Computing solutions nowadays are deployed with several layers of software stacked within components ...
1 Kudos
0 Comments

Intel Security at RSA Conference 2024

Organizations need someone they can trust to help build security from the ground up. The company you...
2 Kudos
0 Comments

Hardware Hacking Insights from iSTARE Researcher Maggie Jauregui

Researcher Maggie Jauregui describes creative approaches to hardware attacks and joy as a superpower...
0 Kudos
0 Comments

Accelerating Confidential AI: Intel at Google Cloud Next

At Google Next, we explored the shift of cloud computing to private, encrypted services that help cu...
2 Kudos
0 Comments

Intel, Thales, and Google Collaborate to Provide End-to-End Data Protection for Sensitive Workloads

Intel collaborated with Google and Thales to address the challenges of managing sensitive data in cl...
1 Kudos
0 Comments

How Intel and Cohesity Use Confidential Computing to Protect Secondary Data

Cohesity recently announced a new collaboration with Intel to bring confidential computing technolog...
1 Kudos
0 Comments

From Confidential Computing to Confidential AI

I recently had a chance to showcase Intel’s capabilities in Confidential Computing at OC3, and how i...
3 Kudos
0 Comments

Chips & Salsa: Intel Security Advisories for March 2024

Do you know what time it is? Yes! It’s Patch Tuesday and today we published 8 security advisories ad...
0 Kudos
0 Comments

Chips & Salsa: Industry Collaboration for new Hardware CWEs

Today Intel is pleased to announce the introduction of four new transient execution weaknesses into ...
0 Kudos
0 Comments

Chips & Salsa: This Hardware Does Not Exist

In Intel’s continuous effort to shift left software testing and validation, we introduce a new softw...
1 Kudos
0 Comments

Chips & Salsa: February 2024 Security Advisories

Today we released 34 security advisories for customers to review. 31 of the advisories are for a var...
0 Kudos
0 Comments

Why we leverage elite hackers to improve our product security

Under the Intel® Bug Bounty Program, Project Circuit Breaker is tasked with building a community of ...
0 Kudos
0 Comments

Cybersecurity: 5 Trends That Will Transform The Company/Hacker Relationship in 2024

Leveraging the power of the hacker community has never been more important. We expect to see more of...
2 Kudos
0 Comments

INTEL-SA-00950 - Redundant Prefix Issue

In this post we will focus on an out of band update for a potential escalation of privilege vulnerab...
0 Kudos
1 Comments

Powering Innovation by Enhancing Trust in Confidential Computing: Intel® Trust Authority and Thales

Intel and Thales have met the challenge of ensuring the integrity of cloud computing environments wi...
0 Kudos
0 Comments

Leidos Uses Intel® Trust Authority to Achieve NIST Zero Trust Architecture

Leidos and Intel are collaborating to adopt key NIST tenets by deploying Confidential Computing with...
0 Kudos
0 Comments

Zscaler Scales Confidential Computing and Zero Trust with Intel® Trust Authority

Intel and Zscaler recently collaborated on a unique approach to utilizing the power of confidential ...
0 Kudos
0 Comments