NCF-336 Confidential Computing Explained

Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access to view the operations and extract the intellectual property or private operations of an executing process. With Confidential Computing, the process is run protected, so its operation is hidden even from the owner of the computer it is running on. Join in today and listen to some great explanations on how to protect your valuable intellectual property today.

Om Podcasten

Welcome to the New Cyber Frontier, Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics. Hear about developments which impact and affect both the local Colorado efforts and the entire virtual world. You don’t have to be a computer or cyber security expert to get plugged in, Our New Cyber Frontier host Chris Gorog bring it straightforward, asks the tough questions, and brings the cyber world to a level of understand for everyone.