Why We Need to Cultivate a Confidential Computing Ecosystem

Researchers have been working on solutions for runtime security for years now.
Computing data and deriving value from it - while also preserving its privacy - is no small challenge.
The industry is tackling runtime security on all fronts - we've seen efforts from hardware makers, public cloud providers and software developers, to name a few.
As the ecosystem of confidential computing solutions continues to grow, it will take real collaboration to bring this level of security to end users.
Until the development of PETs, data in use was the Achilles' heel of security.
Privileged system software like the hypervisor, host OS, firmware and DMA-capable devices were all granted access to workload data and code.
Instead of trying to make all system software secure, confidential computing takes a simple and pragmatic approach to security: It decouples resource management from data access.
In practice, this means that even if a vulnerability existed within the hypervisor, for example, it wouldn't be able to compromise the security of your confidential VMs. Why Collaboration is Necessary.
Any organization that values its data should be interested in embracing confidential computing.
Closing the security vulnerabilities that exist while data is in use has become even more critical now that workforces are growing more dispersed and more data is moving to the cloud.
This will require driving awareness of confidential computing, as well as making it more accessible with open source software, standards and tools.
There's already a collective effort to accomplish this underway: The confidential computing consortium is a project community at the Linux Foundation that is focused on accelerating the adoption of confidential computing.
Encouragingly, all corners of the computing industry are engaged in this effort.
In both the public and private cloud, you have to consider the security of the privileged system software - that includes the operating system, virtual machine manager and all the platforms' firmware embedded within.
The last component of a mature confidential computing ecosystem is sensible regulation.
While the entire industry should be encouraging the adoption of confidential computing, the technology is by no means bulletproof.
It's still necessary to install security updates on whatever runs within the boundary of confidential VMs. It's also important to enable a more meaningful and secure remote attestation solution.
The industry is making progress in addressing these kinds of limitations with solutions like regular security patches and operating system updates.
With a proactive approach, enterprises can significantly reduce their exposure to security vulnerabilities and better protect your confidential VMs. Now is the time for all users to embrace confidential computing.
Industry players are making a concerted effort to deliver innovation across all layers of the confidential computing ecosystem.


This Cyber News was published on securityboulevard.com. Publication date: Fri, 26 Jan 2024 14:58:04 +0000


Cyber News related to Why We Need to Cultivate a Confidential Computing Ecosystem

Fortifying confidential computing in Microsoft Azure - I wrote about how Microsoft used Intel's secure extensions to its processor instruction sets to provide a foundation for confidential computing in Azure a few years ago. In the years since, the confidential computing market has taken a few steps ...
11 months ago Infoworld.com
Why We Need to Cultivate a Confidential Computing Ecosystem - Researchers have been working on solutions for runtime security for years now. Computing data and deriving value from it - while also preserving its privacy - is no small challenge. The industry is tackling runtime security on all fronts - we've seen ...
9 months ago Securityboulevard.com
Edge Computing: Data and Connectivity - Edge computing is a distributed computing model that brings processing capabilities closer to the data source, be it IoT devices, sensors, or end-user devices, rather than relying on centralized data centers. By decentralizing data processing, edge ...
11 months ago Feeds.dzone.com
Quantum computing: The data security conundrum - One of the biggest challenges of digital technology today is around security systems and data. While this has proven successful, advancements in quantum computing - which utilises quantum mechanics to solve complex problems faster than conventional ...
9 months ago Itsecurityguru.org
Edge Computing: Enhancing Data Processing - Edge computing revolutionizes data processing by bringing computational power closer to where data is generated, enhancing efficiency and responsiveness. Discover how edge computing is reshaping technology and our interactions with it, unlocking a ...
8 months ago Securityzap.com
Creating a Smart Home Ecosystem: Seamless Connectivity - Like a finely tuned symphony, creating a smart home ecosystem has the potential to bring harmony and convenience to everyday life. Establishing an interconnected network of digital devices to enable user-controlled automation of various household ...
11 months ago Securityzap.com
The Role of Single Sign-On in Cloud Computing - Cloud computing has transformed how businesses access and manage their data and apps. We will look at the importance of SSO in cloud computing, its advantages, important components, implementation, obstacles, and the future of secure access ...
9 months ago Feeds.dzone.com
Breakthrough promises secure quantum computing at home - The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies, thanks to a breakthrough by scientists at Oxford University Physics guaranteeing security and privacy. This advance promises to ...
7 months ago Sciencedaily.com
Legal and Compliance Considerations in Cloud Computing - This paradigm change has faced challenges, primarily legal and compliance issues. This can present severe legal issues, particularly regarding data ownership. According to S. Krishnan, the transforming nature of computing has created legal ...
9 months ago Feeds.dzone.com
Best Practices for Cloud Computing Security - Given that business data is often sensitive and confidential, cloud computing environments require necessary security measures. As you navigate cloud computing platforms, here are essential security tips to remember. Look for cloud computing services ...
5 months ago Hackread.com
Why Companies Are Moving Back to On-Premise From the Cloud - The past few years have made cloud computing an undisputed king of IT infrastructure in business. Companies flocked to the cloud for cost-efficiency, scalability, and flexibility. The online survey portals show that the cloud adoption rate among ...
10 months ago Feeds.dzone.com
Best practices for cloud configuration security - Cloud computing has become an integral part of IT infrastructure for businesses of all sizes, providing on-demand access to a wide range of services and resources. The evolution of cloud computing has been driven by the need for more efficient, ...
11 months ago Securityintelligence.com
Quantum computing will enable a safer, more secure world - Today's media narrative around quantum computing's role in cybersecurity is overwhelmingly negative, because quantum computers will render today's encryption standards redundant, leaving much of our data at risk of being decoded. First, it's ...
10 months ago Cybersecurity-insiders.com
How enterprises are using gen AI to protect against ChatGPT leaks - ChatGPT is the new DNA of shadow IT, exposing organizations to new risks no one anticipated. Enterprise workers are gaining a 40% performance boost thanks to ChatGPT based on a recent Harvard University study. A second study from MIT discovered that ...
10 months ago Venturebeat.com
Survey Surfaces Raft of Cloud Security Challenges - A global survey of 414 IT practitioners published this week found 40% of respondents are relying on legacy platforms and practices originally designed for on-premises IT environments to secure cloud computing environments. Conducted by Aviatrix, a ...
9 months ago Securityboulevard.com
The Rise in Attacks Requires Specialized Expertise - Organizations today are increasingly reliant on the convenience, scalability and cost-effectiveness of migrating data and operations to the cloud. While cloud migration offers organizations significant benefits, it has also opened them up to a myriad ...
11 months ago Paloaltonetworks.com
The Endless Pursuit of the Ecosystem - The result was the biggest update I've made to Strategy of Security's cybersecurity ecosystem mapping since I first published it over two years ago. My goal is to define the most comprehensive and accurate taxonomy for the business of cybersecurity ...
11 months ago Securityboulevard.com
Addressing the Cybersecurity Vendor Ecosystem Disconnect - COMMENTARY. If you are a member of the security team in charge of defending a network, you are probably accustomed to working with a technology stack composed of hardware, software, and data from dozens of different sources. Consolidating and joining ...
6 months ago Darkreading.com
Getting your organisation post-quantum ready - While quantum computing is still very much in its early stages, it's important that companies are already thinking about this evolving technology - and more importantly implementing and stress testing much needed solutions suitable for a post-quantum ...
11 months ago Cybersecurity-insiders.com
Adapting cybersecurity for the quantum computing era - Researchers are exploring promising quantum computing applications across various domains, from cryptography and optimization problems to drug discovery and artificial intelligence. The race to harness the power of quantum bits has sparked a wave of ...
11 months ago Helpnetsecurity.com
What is cloud load balancing? - Cloud load balancing is the process of distributing workloads across computing resources in a cloud computing environment and carefully balancing the network traffic accessing those resources. Cloud load balancing helps enterprises achieve ...
8 months ago Techtarget.com
Inside the strategy of Salesforce's new Chief Trust Officer - In this Help Net Security interview, Arkin discusses a collaborative approach to building trust among customers, employees, and stakeholders, focusing on transparency, shared responsibility, and empowering others to integrate trusted and responsible ...
9 months ago Helpnetsecurity.com
AI and Quantum Computing Threaten Encryption and Data Security - While only theoretical at this juncture, one of the big concerns about AI, when combined with quantum computing, is that there is a possibility that what is encrypted at present could be decrypted in the future. This is enough of a security concern ...
11 months ago Securityboulevard.com
Data Privacy and Cloud Computing - In the digital era, where data has become the backbone of businesses, it becomes very important to ensure its security and privacy. The huge growth in cloud computing, wherein data is stored and processed remotely, gave rise to various measures for ...
11 months ago Feeds.dzone.com
Navigating Microsoft's Innovations For 2023: Get Up to Date With The Latest Developments - In the world of digital technology, staying up-to-date with the latest advancements and innovations is becoming increasingly important. As one of the leading technology companies in the world, Microsoft is constantly introducing new innovations in ...
1 year ago Hackread.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)