Contact Sales

Can confidential computing stop the next crypto heist?

Amid the theft of billions of dollars in cryptocurrency over recent months, confidential computing may have a role in protecting people's money in future.

Confidential computing aims to isolate sensitive data and code without exposing it to the rest of the host system – including other applications and users, any rogue insiders, intruders, malicious administrations, and compromised kernels and hypervisors. It does this by processing data out of sight in private memory using hardware-based secure enclaves.

Read the full article on The Register.

Additional Blog Articles

eWeek: Compare Top Confidential Computing Vendors

eWeek: #eWEEKchat Sept. 8: Confidential Computing and Next-Gen Security

Understanding The Utilization Of Confidential Cloud And Confidential Computing