Главная
Study mode:
on
1
Intro
2
2022 Case Study: Red Cross
3
2022 Case Study: Cash App
4
2022 Case Study: LAPSUS$ Attacks
5
Is unauthorized the correct terminology? No.
6
Legacy Deployments
7
Modern Deployments
8
Blaming the User
9
Isolation Types
10
Confidential Computing Consortium...
11
Attestation Requires
12
Confidential Computing Technologies
13
Enarx aims to solve security-at-scale
14
Keep Architecture
15
The Importance of WebAssembly
16
Enarx Services
17
The Enarx Project
18
Profian is a Next-Generation Cloud Security Star
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore the transformative potential of Confidential Computing in cloud technology through this informative conference talk presented at All Things Open 2022. Delve into the core concepts of Confidential Computing, including process-based and VM-based Trusted Execution Environments (TEEs), and understand the critical role of attestation in securing sensitive data and code. Examine various existing and upcoming CPU and GPU technologies supporting Confidential Computing, such as Intel's SGX2 and TDX, AMD's SEV-SNP, IBM's PEF, Arm's Realms, RISC-V's Sanctum, and NVIDIA's A100. Learn how Enarx, an open-source project under the Linux Foundation, demonstrates the practical applications of Confidential Computing. Discover real-world case studies highlighting the importance of enhanced security measures in sectors like healthcare and finance. Gain insights into modern deployment strategies, isolation types, and the significance of WebAssembly in cloud security. Understand how Confidential Computing is revolutionizing cloud accessibility for organizations with stringent data protection requirements, ultimately unlocking the full potential of cloud computing across various industries. Read more

Unlocking the Cloud with Confidential Computing

All Things Open
Add to list