The IT Pro Podcast: The secrets of confidential computing

Episode 34: The secrets of confidential computing. IT Pro Podcast

We’ve heard a lot about cloud computing, edge computing and various other kinds of computing, but confidential computing is less well known. As an emerging encryption model, it promises to offer greater protection to data as it's being used, supplementing at-rest and in-transit encryption.

Protecting against attacks like memory dumps and malicious root user compromise, the development of confidential computing is being spearheaded by the Confidential Computing Consortium, an open-source industry group working to address the problem. In this week’s episode, we talk to Dr Richard Searle, senior security architect at Fortanix and general member’s representative to the governing board of the consortium, about what the technology aims to do.

In this week’s news, we discuss Apple’s decision to make its own Mac chips and other announcements from its annual WWDC conference, HPE’s new software portfolio, and the case of a disgruntled ex-director who deleted all the files in her former employers’ Dropbox account.

Footnotes

News

In-depth

Bonus episodes

Subscribe

ITPro

ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.

For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.