The IT Pro Podcast: The secrets of confidential computing

What is confidential computing, and how can it help protect organisations?

We’ve heard a lot about cloud computing, edge computing and various other kinds of computing, but confidential computing is less well known. As an emerging encryption model, it promises to offer greater protection to data as it's being used, supplementing at-rest and in-transit encryption.

Protecting against attacks like memory dumps and malicious root user compromise, the development of confidential computing is being spearheaded by the Confidential Computing Consortium, an open-source industry group working to address the problem. In this week’s episode, we talk to Dr Richard Searle, senior security architect at Fortanix and general member’s representative to the governing board of the consortium, about what the technology aims to do.

In this week’s news, we discuss Apple’s decision to make its own Mac chips and other announcements from its annual WWDC conference, HPE’s new software portfolio, and the case of a disgruntled ex-director who deleted all the files in her former employers’ Dropbox account.

Footnotes

News

In-depth

Bonus episodes

Subscribe

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021