"confidential computing" Posts in "Blogs"

cancel
Showing results for 
Search instead for 
Did you mean: 
Latest Tagged

Intel Security at RSA Conference 2024

Organizations need someone they can trust to help build security from the ground up. The company you...
2 Kudos
0 Replies

Hardware Hacking Insights from iSTARE Researcher Maggie Jauregui

Researcher Maggie Jauregui describes creative approaches to hardware attacks and joy as a superpower...
0 Kudos
0 Replies

Accelerating Confidential AI: Intel at Google Cloud Next

At Google Next, we explored the shift of cloud computing to private, encrypted services that help cu...
2 Kudos
0 Replies

From Confidential Computing to Confidential AI

I recently had a chance to showcase Intel’s capabilities in Confidential Computing at OC3, and how i...
3 Kudos
0 Replies

Confidential AI: The Convergence of Security, Privacy and AI

Greg Lavender explains how the need for securing AI models is creating a market for confidential AI.
3 Kudos
0 Replies

Introducing Attested Containers

Attested Containers (ACon) is an open source project demonstrating workload protection using Confide...
1 Kudos
0 Replies

Intel’s Trust SaaS is now in Limited Availability

Intel’s independent attestation service, code named Project Amber, is now in Limited Availability. ...
3 Kudos
0 Replies

From Data Protection to Competitive Edge: The Rise of Confidential Computing

Almost every computing silicon vendor, public cloud service provider, and dozens of security softwar...
3 Kudos
0 Replies

Microsoft Azure Embraces Intel’s Attestation SaaS (Code Name: Project Amber) in Preview

Microsoft announced an expansion of its Confidential Computing virtual machine offering to include 4...
3 Kudos
1 Replies

Independent Attestation as a Service: Leidos Health Pilots Intel Project Amber

Authors: Anil Rao, VP & GM of Systems Architecture Engineering in the Office of the CTO, Liz Porter,...
1 Kudos
1 Replies

Security Begins with Intel at RSA Conference 2023

Security Built-In. Security to Build-On. Now more than ever, Security Begins with Intel.
5 Kudos
0 Replies

Confidential Computing: From Niche to Mainstream

Confidential computing is an essential function and also presents a huge market opportunity. Intel's...
4 Kudos
0 Replies

Providing End-to-End Data Protection for AI/HPC/HPDA Workloads

The primary idea behind confidential computing, is to never have unprotected data residing in the me...
2 Kudos
0 Replies

Intel Software Realizing Ecosystem Value and Developer Productivity

Intel software is building momentum, powering much of the world’s computing to realize ecosystem val...
2 Kudos
0 Replies

How Accenture used Intel’s Project Amber for Multi-Cloud Federated Learning

Authors: Nikhil Deshpande, Senior Director of Security and Chief Business Strategist for Project Amb...
1 Kudos
0 Replies

Zero-Trust Confidential Computing for Containers with Intel’s Project Amber

In this blog, we’ll look at what confidential containers are, how container confidential computing w...
3 Kudos
0 Replies

Securing AI - and Other Leading Use Cases - with Confidential Computing

Securing AI—and Other Leading Use Cases—with Confidential Computing
0 Kudos
0 Replies

Advancing Confidential Computing with Intel’s Project Amber

In just a few short years, confidential computing has gained wide attention and momentum as a powerf...
2 Kudos
0 Replies

Protecting PyTorch Inference models with Intel® Software Guard Extensions (Intel® SGX)

Learn how to protect your deep learning models in public clouds utilizing PyTorch and Intel® Softwar...
1 Kudos
0 Replies

Confidential Computing—the emerging paradigm for protecting data in-use

As computing moves to span multiple environments—from on-prem to public cloud to edge computing—orga...
0 Kudos
0 Replies