Success! Subscription added.
Success! Subscription removed.
Sorry, you must verify to complete this action. Please click the verification link in your email. You may re-send via your profile.
Unlocking Healthcare Security: Hands-On with Trusted Platform Module (TPM) Technology
05-10-2024
This blog provides practical steps for interacting with the TPM in both Linux and Windows environmen...
0
Kudos
0
Replies
|
Intel Security at RSA Conference 2024
05-06-2024
Organizations need someone they can trust to help build security from the ground up. The company you...
2
Kudos
0
Replies
|
Hardware Hacking Insights from iSTARE Researcher Maggie Jauregui
05-01-2024
Researcher Maggie Jauregui describes creative approaches to hardware attacks and joy as a superpower...
0
Kudos
0
Replies
|
Accelerating Confidential AI: Intel at Google Cloud Next
04-24-2024
At Google Next, we explored the shift of cloud computing to private, encrypted services that help cu...
2
Kudos
0
Replies
|
Intel, Thales, and Google Collaborate to Provide End-to-End Data Protection for Sensitive Workloads
04-09-2024
Intel collaborated with Google and Thales to address the challenges of managing sensitive data in cl...
1
Kudos
0
Replies
|
How Intel and Cohesity Use Confidential Computing to Protect Secondary Data
04-09-2024
Cohesity recently announced a new collaboration with Intel to bring confidential computing technolog...
1
Kudos
0
Replies
|
From Confidential Computing to Confidential AI
03-25-2024
I recently had a chance to showcase Intel’s capabilities in Confidential Computing at OC3, and how i...
3
Kudos
0
Replies
|
Chips & Salsa: Intel Security Advisories for March 2024
03-12-2024
Do you know what time it is? Yes! It’s Patch Tuesday and today we published 8 security advisories ad...
0
Kudos
0
Replies
|
Unlocking Healthcare Security: Introduction to Trusted Platform Module (TPM) Technology
03-08-2024
Many Trusted Platform Module features are likely already in use already behind the scenes on your sy...
1
Kudos
0
Replies
|
Chips & Salsa: Industry Collaboration for new Hardware CWEs
02-29-2024
Today Intel is pleased to announce the introduction of four new transient execution weaknesses into ...
0
Kudos
0
Replies
|
Why do we need a Undefined Behavior Annex for the C++ standard?
02-27-2024
Intel's C/C++ compiler software developers are starting a new series of blog posts highlighting Inte...
0
Kudos
0
Replies
|
Emerging Fisheye and Panoramic Cameras in Healthcare
02-26-2024
The blog discusses the evolution of camera technology, focusing on the benefits and challenges of us...
2
Kudos
2
Replies
|
Chips & Salsa: This Hardware Does Not Exist
02-20-2024
In Intel’s continuous effort to shift left software testing and validation, we introduce a new softw...
1
Kudos
0
Replies
|
Chips & Salsa: February 2024 Security Advisories
02-13-2024
Today we released 34 security advisories for customers to review. 31 of the advisories are for a var...
0
Kudos
0
Replies
|
Seamless Attestation of Intel® TDX and NVIDIA H100 TEEs with Intel® Trust Authority
09-20-2023
Intel and NVIDIA are collaborating on a Confidential Computing solution for Intel processors with In...
1
Kudos
1
Replies
|
Economic security is (inter)national security
02-08-2024
European Commission President Ursula von der Leyen’s “de-risking not decoupling” speech at the World...
0
Kudos
0
Replies
|
Intel Continues to Lead Efforts to Establish FHE Standards for Encrypted Computing
02-05-2024
Intel’s encrypted computing program is at the forefront of technology and standards development for ...
1
Kudos
0
Replies
|
Why we leverage elite hackers to improve our product security
12-12-2023
Under the Intel® Bug Bounty Program, Project Circuit Breaker is tasked with building a community of ...
0
Kudos
0
Replies
|
Cybersecurity: 5 Trends That Will Transform The Company/Hacker Relationship in 2024
12-08-2023
Leveraging the power of the hacker community has never been more important. We expect to see more of...
2
Kudos
0
Replies
|
INTEL-SA-00950 - Redundant Prefix Issue
11-14-2023
In this post we will focus on an out of band update for a potential escalation of privilege vulnerab...
0
Kudos
1
Replies
|
Attested Boot with User's Customized Encrypted TD OS image
12-05-2023
Authored by: Yunge Zhu (Intel, Cloud Software Engineer), Guorui Yu (Alibaba Cloud, Security Expert),...
0
Kudos
0
Replies
|
Powering Innovation by Enhancing Trust in Confidential Computing: Intel® Trust Authority and Thales
09-20-2023
Intel and Thales have met the challenge of ensuring the integrity of cloud computing environments wi...
0
Kudos
0
Replies
|
Leidos Uses Intel® Trust Authority to Achieve NIST Zero Trust Architecture
09-20-2023
Leidos and Intel are collaborating to adopt key NIST tenets by deploying Confidential Computing with...
0
Kudos
0
Replies
|
Zscaler Scales Confidential Computing and Zero Trust with Intel® Trust Authority
09-20-2023
Intel and Zscaler recently collaborated on a unique approach to utilizing the power of confidential ...
0
Kudos
0
Replies
|
How Intel® Trust Authority Attestation Service Can Be Used to Enhance Confidential Computing
09-20-2023
The new Intel Trust Authority's attestation services provide Confidential Computing in a stable, eas...
0
Kudos
0
Replies
|
Community support is provided during standard business hours (Monday to Friday 7AM - 5PM PST). Other contact methods are available here.
Intel does not verify all solutions, including but not limited to any file transfers that may appear in this community. Accordingly, Intel disclaims all express and implied warranties, including without limitation, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement, as well as any warranty arising from course of performance, course of dealing, or usage in trade.
For more complete information about compiler optimizations, see our Optimization Notice.