Two Google employees in front of an overcomplicate slide describing confidential computing securing an AI workflow
#Google on stage at #oc3
Using #confidentialcomputing for #mcp is #trustwashing
I coin this term here ™️
Latest posts tagged with #ConfidentialComputing on Bluesky
Two Google employees in front of an overcomplicate slide describing confidential computing securing an AI workflow
#Google on stage at #oc3
Using #confidentialcomputing for #mcp is #trustwashing
I coin this term here ™️
Felix Schuster in front of the Opening Slide of the OC3 Open Confidential Computing conference
https://www.oc3.dev/
If you are interested in #confidentialcomputing
Pre Event. Main Event is streamed from 4pm.
Azure Confidential Computing with KT Corporation and AMD: KT, Korea’s leading telecommunications provider, is delivering a next‑generation Secure Public Cloud Service with Microsoft Azure Confidential Computing and 4th generation AMD EPYC “Genoa”… @Azure #Azure #CloudComputing #ConfidentialComputing
Modern threats require a modern security architecture.
Join us and sponsor Red Hat on March 17th for this FREE virtual summit on defending the modern enterprise in the AI and hybrid era.
Register now: https://ow.ly/F6KU50Yr9lj
#Cybersecurity #ZeroTrust #CloudSecurity #ConfidentialComputing
Modern threats require a modern security architecture.
Join us and sponsor Red Hat on March 17th for this FREE virtual summit on defending the modern enterprise in the AI and hybrid era.
Register now: https://ow.ly/nKbh50Yr9cA
#Cybersecurity #ZeroTrust #CloudSecurity #ConfidentialComputing
Modern threats require a modern security architecture.
Join us and sponsor Red Hat on March 17th for this FREE virtual summit on defending the modern enterprise in the AI and hybrid era.
Register now: https://ow.ly/LQbr50Yr939
#Cybersecurity #ZeroTrust #CloudSecurity #ConfidentialComputing
Docker 的十年:重塑云原生基础设施的“底层炼金术” 本文永久链接 – tonybai.com/2026/03/09/a-decade-of-d... 大家好,我是Tony Bai。 2013年,...
#技术志 #AIAgents #AI代理 #BridgedNetwork #CDI #cloudnative #ConfidentialComputing #ContainerDeviceInterface #Containerization #containers #docker
Origin | Interest | Match
James Bottomley taking us through the ins and outs of TPMs at SCaLE 23x.
#SCaLE #Linux #kernel #infosec #confidentialcomputing #measuredboot #LUKS
True fairness isn't a promise. It's an architecture.
Read the full technical deep dive on Dev.to:
🔗 dev.to/crow004/buil...
#ConfidentialComputing #IntelSGX #CyberSecurity #Web3Gaming #HardwareTrust
Federated ML lets organizations train powerful global models without moving sensitive data. Using Azure Confidential Computing + AWS Nitro Enclaves, we can secure training & inference end‑to‑end across clouds.
#FederatedLearning #CloudSecurity #AI #ConfidentialComputing #EdgeCompute #CloudDailywire
Running code in the cloud usually means trusting the landlord not to peek.
At #FOSSASIA2026, Peter Membrey (ExpressVPN) is releasing an open source framework for Secure GPU Workloads in Enclaves.
It allows you to cryptographically verify your hardware and treat the cloud provider as an […]
Confidential computing strengthens data protection by using secure enclaves, encryption in use, hardware isolation and trusted verification, supporting private processing across cloud and AI environments through shared standards and alignment.
#ConfidentialComputing #Cybersecurity #CloudSecurity
Confidential Computing schützt Anwendungen, Datenbanken oder auch KI-Workloads selbst während der Verarbeitung durch isolierte Ausführungsumgebungen („Enklaven“). #ConfidentialComputing #Datensicherheit #DigitaleSouveränität #Enclaive #ZeroTrust
www.sysbus.eu/?p=30791
Confidential Computing schützt Anwendungen, Datenbanken oder auch KI-Workloads selbst während der Verarbeitung durch isolierte Ausführungsumgebungen („Enklaven“). #ConfidentialComputing #Datensicherheit #DigitaleSouveränität #Enclaive #ZeroTrust
www.sysbus.eu/?p=30791
[ELASTIC Demo Series] Demonstrator #2 MVP
Migration of a sensitive IT service to the public cloud using TEE, verified trust checks & AI-driven security monitoring.
🎥Watch: youtu.be/xfu5mmo5YWs
#ELASTIC #CloudSecurity #ConfidentialComputing #MVP
StackWarp Attack Threatens AMD VMs
Read More: buff.ly/nI23NTy
#AMD #Zen #ConfidentialComputing #CloudSecurity #VirtualizationSecurity #SEVSNP #HardwareSecurity #CVE202529943 #VMescape #CryptoSecurity #CyberResearch
🚀 Tired of cloud security worries? Nvidia's Vera Rubin NVL72 secures AI models with encryption for all 72 GPUs, ensuring data privacy! 🔒 What security features matter most to you? 💬 #AIsecurity #Nvidia #ConfidentialComputing LINK
"𝗔𝗜 𝘀𝗼𝘃𝗲𝗿𝗲𝗶𝗴𝗻𝘁𝘆" 𝗶𝘀𝗻'𝘁 𝗮𝗯𝗼𝘂𝘁 𝘄𝗵𝗲𝗿𝗲 𝘆𝗼𝘂𝗿 𝘀𝗲𝗿𝘃𝗲𝗿𝘀 𝘀𝗶𝘁.
It's about what happens to your data when computation begins.
Read the full breakdown: mirrorsecurity.io/blog/soverei...
#AISecurity #DataSovereignty #ConfidentialComputing #FHE #MirrorSecurity
Verifiable AI with Zero-Knowledge Proofs Explained #AItrust #secureAIinference #verifiableAI #ZKSTARKs #AItransparency #zksnarks #confidentialcomputing #provableAI #ZeroKnowledgeProofs #AImodelverification
Confidential computing security analytics is complex. GhostTelemetry simplifies it. I use AWS Nitro Enclaves, OCI AMD SEV-SNP, YubiKey policy signing, and a Merkle-tree audit ledger. Alpha ready. github.com/w8mej/GhostT... #ConfidentialComputing #CloudSecurity #AWS #OCISecurity #GhostTelemetry
Our recent blog post shows how OpenNebula lets you deploy VMs with encrypted memory, keeping your data and OS secure even on a public cloud bare metal you don’t own.
Read more: opennebula.io/blog/innovat...
#confidentialcomputing #cloudmanagemen
#ELASTIC has completed its mid-term review with strong progress across architecture, demonstrators, and open-source work. Early MVPs are already running in real setups.
Full press release: elasticproject.eu/press-releas...
#ELASTIC #SNSJU #HorizonEurope #6G #EdgeComputing #ConfidentialComputing
Das Whitepaper von Axel Sass und Jens Freimann und mir hat es durch die interne Red Hat Veröffentlichungspipeline geschafft 🎉🎊
#redhat #confidentialcomputing
https://www.linkedin.c…
Wer keinen Bock auf LI hat: hier der direkte Link
https://www.redhat.com…
Disclaimer:… https://23.social/@tho…
Das Whitepaper von Axel Sass und Jens Freimann und mir hat es durch die interne Red Hat Veröffentlichungspipeline geschafft 🎉🎊
#redhat #confidentialcomputing
www.linkedin.com/feed/update/urn:li:activ...
Wer keinen Bock auf LI hat: hier der direkte Link […]
Investing in Private Web3: The Infrastructure Angle #PrivacyCoins #ZeroKnowledgeProofs #web3privacysolutions #SecureMultiPartyComputation #Web3infrastructure #confidentialcomputing #DecentralizedApplications #decentralizedinfrastructure #BlockchainPrivacy #web3investment
Acurast secured $11M to develop a confidential computing platform utilizing consumer smartphones as tamper-resistant nodes for secure workload processing. @Blockchain #ConfidentialComputing By Dynamic Nexus © #DynamicNexus #DynamicNexusCrypto
HN discussed OpenPCC, an open-source Apple Private Compute Cloud. Focus: Can it truly prevent providers from accessing plaintext data? Explored privacy claims vs. physical attacks & gov't coercion, comparing to Nitro Enclaves. #ConfidentialComputing 1/6
Thanks to @ajuvo for the hint
The French gouv shares my opinions on #confidentialcomputing
"However, Confidential Computing is not secure enough to protect data integrity and confidentiality against a hostile administrator performing targeted, active attacks. Under such a… https://23.social/@thom…
Thanks to @ajuvo for the hint
The French gouv shares my opinions on #confidentialcomputing
"However, Confidential Computing is not secure enough to protect data integrity and confidentiality against a hostile administrator performing targeted, active attacks. Under such a threat model, users […]
Position Paper Confidential Computing
🔵 L'ANSSI partage son positionnement vis-à-vis du #ConfidentialComputing.
📝 L'Agence rappelle notamment les modèles d'attaque que le Confidential Computing prétend traiter, ainsi que des lignes directrices.
🔗 cyber.gouv.fr/en/publications/technica...