"Security" Posts in "Blogs"

cancel
Showing results for 
Search instead for 
Did you mean: 
Latest Tagged

Unlocking Healthcare Security: Hands-On with Trusted Platform Module (TPM) Technology

This blog provides practical steps for interacting with the TPM in both Linux and Windows environmen...
0 Kudos
0 Replies

Intel Security at RSA Conference 2024

Organizations need someone they can trust to help build security from the ground up. The company you...
2 Kudos
0 Replies

Hardware Hacking Insights from iSTARE Researcher Maggie Jauregui

Researcher Maggie Jauregui describes creative approaches to hardware attacks and joy as a superpower...
0 Kudos
0 Replies

Accelerating Confidential AI: Intel at Google Cloud Next

At Google Next, we explored the shift of cloud computing to private, encrypted services that help cu...
2 Kudos
0 Replies

Intel, Thales, and Google Collaborate to Provide End-to-End Data Protection for Sensitive Workloads

Intel collaborated with Google and Thales to address the challenges of managing sensitive data in cl...
1 Kudos
0 Replies

How Intel and Cohesity Use Confidential Computing to Protect Secondary Data

Cohesity recently announced a new collaboration with Intel to bring confidential computing technolog...
1 Kudos
0 Replies

From Confidential Computing to Confidential AI

I recently had a chance to showcase Intel’s capabilities in Confidential Computing at OC3, and how i...
3 Kudos
0 Replies

Chips & Salsa: Intel Security Advisories for March 2024

Do you know what time it is? Yes! It’s Patch Tuesday and today we published 8 security advisories ad...
0 Kudos
0 Replies

Unlocking Healthcare Security: Introduction to Trusted Platform Module (TPM) Technology

Many Trusted Platform Module features are likely already in use already behind the scenes on your sy...
1 Kudos
0 Replies

Chips & Salsa: Industry Collaboration for new Hardware CWEs

Today Intel is pleased to announce the introduction of four new transient execution weaknesses into ...
0 Kudos
0 Replies

Why do we need a Undefined Behavior Annex for the C++ standard?

Intel's C/C++ compiler software developers are starting a new series of blog posts highlighting Inte...
0 Kudos
0 Replies

Emerging Fisheye and Panoramic Cameras in Healthcare

The blog discusses the evolution of camera technology, focusing on the benefits and challenges of us...
2 Kudos
2 Replies

Chips & Salsa: This Hardware Does Not Exist

In Intel’s continuous effort to shift left software testing and validation, we introduce a new softw...
1 Kudos
0 Replies

Chips & Salsa: February 2024 Security Advisories

Today we released 34 security advisories for customers to review. 31 of the advisories are for a var...
0 Kudos
0 Replies

Seamless Attestation of Intel® TDX and NVIDIA H100 TEEs with Intel® Trust Authority

Intel and NVIDIA are collaborating on a Confidential Computing solution for Intel processors with In...
1 Kudos
1 Replies

Economic security is (inter)national security

European Commission President Ursula von der Leyen’s “de-risking not decoupling” speech at the World...
0 Kudos
0 Replies

Intel Continues to Lead Efforts to Establish FHE Standards for Encrypted Computing

Intel’s encrypted computing program is at the forefront of technology and standards development for ...
1 Kudos
0 Replies

Why we leverage elite hackers to improve our product security

Under the Intel® Bug Bounty Program, Project Circuit Breaker is tasked with building a community of ...
0 Kudos
0 Replies

Cybersecurity: 5 Trends That Will Transform The Company/Hacker Relationship in 2024

Leveraging the power of the hacker community has never been more important. We expect to see more of...
2 Kudos
0 Replies

INTEL-SA-00950 - Redundant Prefix Issue

In this post we will focus on an out of band update for a potential escalation of privilege vulnerab...
0 Kudos
1 Replies

Attested Boot with User's Customized Encrypted TD OS image

Authored by: Yunge Zhu (Intel, Cloud Software Engineer), Guorui Yu (Alibaba Cloud, Security Expert),...
0 Kudos
0 Replies

Powering Innovation by Enhancing Trust in Confidential Computing: Intel® Trust Authority and Thales

Intel and Thales have met the challenge of ensuring the integrity of cloud computing environments wi...
0 Kudos
0 Replies

Leidos Uses Intel® Trust Authority to Achieve NIST Zero Trust Architecture

Leidos and Intel are collaborating to adopt key NIST tenets by deploying Confidential Computing with...
0 Kudos
0 Replies

Zscaler Scales Confidential Computing and Zero Trust with Intel® Trust Authority

Intel and Zscaler recently collaborated on a unique approach to utilizing the power of confidential ...
0 Kudos
0 Replies

How Intel® Trust Authority Attestation Service Can Be Used to Enhance Confidential Computing

The new Intel Trust Authority's attestation services provide Confidential Computing in a stable, eas...
0 Kudos
0 Replies