Webinar Replay: How to Easily Deploy Confidential Computing

Steve Van Lare, Anjuna's Vice President of Engineering, recently presented with SNIA as part of the webinar, "How to Easily Deploy Confidential Computing." In this webcast, he joined Intel's Michael Hoard and Anand Kashyap of Fortanix to discuss real-life ways confidential computing can mitigate threat exposure. 

Watch the recording below: 


Additional Blog Articles

| 1 MINUTE READ

Vinton Cerf: Confidential Computing is a Game Changer

Vinton Cerf, the father of the Internet, talks about why confidential computing is a transformational technology that should be part of every...


| 1 MINUTE READ

eWeek: Compare Top Confidential Computing Vendors

Chris Preimesberger of eWeek defines confidential computing as, "Confidential computing is an emerging approach to encrypting data while it is...


| 2 MINUTE READ

Help Net Security: Can the public cloud become confidential?

In this article for Help Net Security, Anjuna CEO Ayal Yogev outlines the challenges CISOs face with public cloud security, citing 451 Research....