Trending

#confidentialcomputing

Latest posts tagged with #confidentialcomputing on Bluesky

Latest Top
Trending

Posts tagged #confidentialcomputing

Two Google employees in front of an overcomplicate slide describing confidential computing securing an AI workflow

Two Google employees in front of an overcomplicate slide describing confidential computing securing an AI workflow

#Google on stage at #oc3

Using #confidentialcomputing for #mcp is #trustwashing

I coin this term here ™️

0 0 0 0
Felix Schuster in front of the Opening Slide of the OC3  Open Confidential Computing conference

Felix Schuster in front of the Opening Slide of the OC3 Open Confidential Computing conference

https://www.oc3.dev/

If you are interested in #confidentialcomputing

Pre Event. Main Event is streamed from 4pm.

1 0 0 0
Azure Confidential Computing with KT Corporation and AMD
Azure Confidential Computing with KT Corporation and AMD KT, Korea’s leading telecommunications provider, is delivering a next‑generation Secure Public Cloud Service with Microsoft Azure Confidential Computing and 4th generation AMD EPYC “Genoa” processors. Designed for highly regulated industries, the platform helps address strict data sovereignty, privacy, and compliance requirements without sacrificing public cloud scale. Azure Confidential Computing protects data in use through hardware‑based attestation and memory protection. Combining this with customer managed keys helps to ensure only data owners can access sensitive information. Together with Microsoft and AMD, KT is enabling public sector and regulated organizations to adopt cloud and AI with confidence—powering innovation while safeguarding their most sensitive workloads. Learn more about the latest Azure AMD based confidential VMs by viewing the announcement blog: https://msft.it/6059QKm7t #MicrosoftAzure #AzureConfidentialComputing #ConfidentialComputing

Azure Confidential Computing with KT Corporation and AMD: KT, Korea’s leading telecommunications provider, is delivering a next‑generation Secure Public Cloud Service with Microsoft Azure Confidential Computing and 4th generation AMD EPYC “Genoa”… @Azure #Azure #CloudComputing #ConfidentialComputing

0 0 0 0
Post image

Modern threats require a modern security architecture.

Join us and sponsor Red Hat on March 17th for this FREE virtual summit on defending the modern enterprise in the AI and hybrid era.

Register now: https://ow.ly/F6KU50Yr9lj

#Cybersecurity #ZeroTrust #CloudSecurity #ConfidentialComputing

0 0 0 0
Post image

Modern threats require a modern security architecture.

Join us and sponsor Red Hat on March 17th for this FREE virtual summit on defending the modern enterprise in the AI and hybrid era.

Register now: https://ow.ly/nKbh50Yr9cA

#Cybersecurity #ZeroTrust #CloudSecurity #ConfidentialComputing

0 0 0 0
Post image

Modern threats require a modern security architecture.

Join us and sponsor Red Hat on March 17th for this FREE virtual summit on defending the modern enterprise in the AI and hybrid era.

Register now: https://ow.ly/LQbr50Yr939

#Cybersecurity #ZeroTrust #CloudSecurity #ConfidentialComputing

0 0 0 0
Docker 的十年:重塑云原生基础设施的“底层炼金术” - Tony Bai 本文永久链接 - https://tonybai.com/2026/03/09/a-decade-of-docker-containers 大家好,我是Tony Bai。 2013年,当 Solomon Hykes 在 PyCon 上首次演示 Docker 时,他用一种名为“容器”的魔法,将开发者从依赖

Docker 的十年:重塑云原生基础设施的“底层炼金术” 本文永久链接 – tonybai.com/2026/03/09/a-decade-of-d... 大家好,我是Tony Bai。 2013年,...

#技术志 #AIAgents #AI代理 #BridgedNetwork #CDI #cloudnative #ConfidentialComputing #ContainerDeviceInterface #Containerization #containers #docker

Origin | Interest | Match

0 0 0 0
Post image

James Bottomley taking us through the ins and outs of TPMs at SCaLE 23x.

#SCaLE #Linux #kernel #infosec #confidentialcomputing #measuredboot #LUKS

1 0 0 0
Preview
DEV Community A space to discuss and keep up software development and manage your software career

True fairness isn't a promise. It's an architecture.

Read the full technical deep dive on Dev.to:
🔗 dev.to/crow004/buil...

#ConfidentialComputing #IntelSGX #CyberSecurity #Web3Gaming #HardwareTrust

0 0 0 0
Preview
Federated Secure ML: A New Paradigm for Data Privacy In most enterprises today, the first instinct for building machine learning systems is still the same: gather data into a single, centralized lake, then train models on top. But that model of “bring all the data to the model” is colliding head-on with a new reality—one defined by stringent privacy laws, cross-border data residency restrictions, and deepening concerns about data breaches and model exploitation.

Federated ML lets organizations train powerful global models without moving sensitive data. Using Azure Confidential Computing + AWS Nitro Enclaves, we can secure training & inference end‑to‑end across clouds.
#FederatedLearning #CloudSecurity #AI #ConfidentialComputing #EdgeCompute #CloudDailywire

0 0 0 0
Original post on f.rolandturner.com

Running code in the cloud usually means trusting the landlord not to peek.

At #FOSSASIA2026, Peter Membrey (ExpressVPN) is releasing an open source framework for Secure GPU Workloads in Enclaves.

It allows you to cryptographically verify your hardware and treat the cloud provider as an […]

1 0 0 0
Post image

Confidential computing strengthens data protection by using secure enclaves, encryption in use, hardware isolation and trusted verification, supporting private processing across cloud and AI environments through shared standards and alignment.

#ConfidentialComputing #Cybersecurity #CloudSecurity

1 0 0 0
Post image

Confidential Computing schützt Anwendungen, Datenbanken oder auch KI-Workloads selbst während der Verarbeitung durch isolierte Ausführungsumgebungen („Enklaven“). #ConfidentialComputing #Datensicherheit #DigitaleSouveränität #Enclaive #ZeroTrust
www.sysbus.eu/?p=30791

0 0 0 0
Post image

Confidential Computing schützt Anwendungen, Datenbanken oder auch KI-Workloads selbst während der Verarbeitung durch isolierte Ausführungsumgebungen („Enklaven“). #ConfidentialComputing #Datensicherheit #DigitaleSouveränität #Enclaive #ZeroTrust
www.sysbus.eu/?p=30791

0 0 0 0
[ELASTIC Demo Series] Demonstrator #2 MVP - Migration of a Sensitive IT Service to the Public Cloud
[ELASTIC Demo Series] Demonstrator #2 MVP - Migration of a Sensitive IT Service to the Public Cloud YouTube video by ELASTIC – EU Project under SNS JU

[ELASTIC Demo Series] Demonstrator #2 MVP

Migration of a sensitive IT service to the public cloud using TEE, verified trust checks & AI-driven security monitoring.

🎥Watch: youtu.be/xfu5mmo5YWs

#ELASTIC #CloudSecurity #ConfidentialComputing #MVP

0 0 0 0
Post image

StackWarp Attack Threatens AMD VMs
Read More: buff.ly/nI23NTy

#AMD #Zen #ConfidentialComputing #CloudSecurity #VirtualizationSecurity #SEVSNP #HardwareSecurity #CVE202529943 #VMescape #CryptoSecurity #CyberResearch

0 0 0 0

🚀 Tired of cloud security worries? Nvidia's Vera Rubin NVL72 secures AI models with encryption for all 72 GPUs, ensuring data privacy! 🔒 What security features matter most to you? 💬 #AIsecurity #Nvidia #ConfidentialComputing LINK

0 0 0 0
Post image

"𝗔𝗜 𝘀𝗼𝘃𝗲𝗿𝗲𝗶𝗴𝗻𝘁𝘆" 𝗶𝘀𝗻'𝘁 𝗮𝗯𝗼𝘂𝘁 𝘄𝗵𝗲𝗿𝗲 𝘆𝗼𝘂𝗿 𝘀𝗲𝗿𝘃𝗲𝗿𝘀 𝘀𝗶𝘁.

It's about what happens to your data when computation begins.

Read the full breakdown: mirrorsecurity.io/blog/soverei...

#AISecurity #DataSovereignty #ConfidentialComputing #FHE #MirrorSecurity

0 0 0 0
Preview
Verifiable AI with Zero-Knowledge Proofs Explained We're building a world that runs on artificial intelligence. From the algorithm that decides if you get a loan to the AI model that helps a doctor diagnose cancer, these…

Verifiable AI with Zero-Knowledge Proofs Explained #AItrust #secureAIinference #verifiableAI #ZKSTARKs #AItransparency #zksnarks #confidentialcomputing #provableAI #ZeroKnowledgeProofs #AImodelverification

0 0 0 0
Post image

Confidential computing security analytics is complex. GhostTelemetry simplifies it. I use AWS Nitro Enclaves, OCI AMD SEV-SNP, YubiKey policy signing, and a Merkle-tree audit ledger. Alpha ready. github.com/w8mej/GhostT... #ConfidentialComputing #CloudSecurity #AWS #OCISecurity #GhostTelemetry

0 0 0 0
Post image

Our recent blog post shows how OpenNebula lets you deploy VMs with encrypted memory, keeping your data and OS secure even on a public cloud bare metal you don’t own.

Read more: opennebula.io/blog/innovat...

#confidentialcomputing #cloudmanagemen

0 0 0 0
Post image

#ELASTIC has completed its mid-term review with strong progress across architecture, demonstrators, and open-source work. Early MVPs are already running in real setups.

Full press release: elasticproject.eu/press-releas...

#ELASTIC #SNSJU #HorizonEurope #6G #EdgeComputing #ConfidentialComputing

3 0 0 0

Das Whitepaper von Axel Sass und Jens Freimann und mir hat es durch die interne Red Hat Veröffentlichungspipeline geschafft 🎉🎊

#redhat #confidentialcomputing

https://www.linkedin.c…

Wer keinen Bock auf LI hat: hier der direkte Link

https://www.redhat.com…

Disclaimer:… https://23.social/@tho…

0 0 0 0
Original post on 23.social

Das Whitepaper von Axel Sass und Jens Freimann und mir hat es durch die interne Red Hat Veröffentlichungspipeline geschafft 🎉🎊

#redhat #confidentialcomputing

www.linkedin.com/feed/update/urn:li:activ...

Wer keinen Bock auf LI hat: hier der direkte Link […]

0 0 0 0
Preview
Investing in Private Web3: The Infrastructure Angle The Gold Rush Is Over. It's Time to Sell Shovels. Everyone's talking about the next 100x token. The next meme coin to the moon. The next NFT project that'll make…

Investing in Private Web3: The Infrastructure Angle #PrivacyCoins #ZeroKnowledgeProofs #web3privacysolutions #SecureMultiPartyComputation #Web3infrastructure #confidentialcomputing #DecentralizedApplications #decentralizedinfrastructure #BlockchainPrivacy #web3investment

0 0 0 0

Acurast secured $11M to develop a confidential computing platform utilizing consumer smartphones as tamper-resistant nodes for secure workload processing. @Blockchain #ConfidentialComputing By Dynamic Nexus © #DynamicNexus #DynamicNexusCrypto

0 0 0 0

HN discussed OpenPCC, an open-source Apple Private Compute Cloud. Focus: Can it truly prevent providers from accessing plaintext data? Explored privacy claims vs. physical attacks & gov't coercion, comparing to Nitro Enclaves. #ConfidentialComputing 1/6

0 0 1 0

Thanks to @ajuvo for the hint

The French gouv shares my opinions on #confidentialcomputing

"However, Confidential Computing is not secure enough to protect data integrity and confidentiality against a hostile administrator performing targeted, active attacks. Under such a… https://23.social/@thom…

0 0 0 0
Original post on 23.social

Thanks to @ajuvo for the hint

The French gouv shares my opinions on #confidentialcomputing

"However, Confidential Computing is not secure enough to protect data integrity and confidentiality against a hostile administrator performing targeted, active attacks. Under such a threat model, users […]

0 1 0 0
Position Paper
Confidential Computing

Position Paper Confidential Computing

🔵 L'ANSSI partage son positionnement vis-à-vis du #ConfidentialComputing.

📝 L'Agence rappelle notamment les modèles d'attaque que le Confidential Computing prétend traiter, ainsi que des lignes directrices.

🔗 cyber.gouv.fr/en/publications/technica...

9 3 0 1