Podcasts about confidential computing

  • 114PODCASTS
  • 166EPISODES
  • 33mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • May 26, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about confidential computing

Latest podcast episodes about confidential computing

Crazy Wisdom
Episode #464: From Meme Coins to Mind Melds: Crypto Meets AI

Crazy Wisdom

Play Episode Listen Later May 26, 2025 48:22


I, Stewart Alsop, had a fascinating conversation on this episode of Crazy Wisdom with Mallory McGee, the founder of Chroma, who is doing some really interesting work at the intersection of AI and crypto. We dove deep into how these two powerful technologies might reshape the internet and our interactions with it, moving beyond the hype cycles to what's truly foundational.Check out this GPT we trained on the conversationTimestamps00:00 The Intersection of AI and Crypto01:28 Bitcoin's Origins and Austrian Economics04:35 AI's Centralization Problem and the New Gatekeepers09:58 Agent Interactions and Decentralized Databases for Trustless Transactions11:11 AI as a Prosthetic Mind and the Interpretability Challenge15:12 Deterministic Blockchains vs. Non-Deterministic AI Intents18:44 The Demise of Traditional Apps in an Agent-Driven World35:07 Property Rights, Agent Registries, and Blockchains as BackendsKey InsightsCrypto's Enduring Fundamentals: Mallory emphasized that while crypto prices are often noise, the underlying fundamentals point to a new, long-term cycle for the Internet itself. It's about decentralizing control, a core principle stemming from Bitcoin's original blend of economics and technology.AI's Centralization Dilemma: We discussed the concerning trend of AI development consolidating power within a few major players. This, as Mallory pointed out, ironically mirrors the very centralization crypto aims to dismantle, potentially shifting control from governments to a new set of tech monopolies.Agents are the Future of Interaction: Mallory envisions a future where most digital interactions aren't human-to-LLM, but agent-to-agent. These autonomous agents will require decentralized, trustless platforms like blockchains to transact, hold assets, and communicate confidentially.Bridging Non-Deterministic AI with Deterministic Blockchains: A fascinating challenge Mallory highlighted is translating the non-deterministic "intents" of AI (e.g., an agent's goal to "get me a good return on spare cash") into the deterministic transactions required by blockchains. This translation layer is crucial for agents to operate effectively on-chain.The Decline of Traditional Apps: Mallory made a bold claim that traditional apps and web interfaces are on their way out. As AI agents become capable of generating personalized interfaces on the fly, the need for standardized, pre-built apps will diminish, leading to a world where software is hyper-personalized and often ephemeral.Blockchains as Agent Backbones: We explored the intriguing idea that blockchains might be inherently better suited for AI agents than for direct human use. Their deterministic nature, ability to handle assets, and potential for trustless reputation systems make them ideal backends for an agent-centric internet.Trust and Reputation for Agents: In a world teeming with AI agents, establishing trust is paramount. Mallory suggested that on-chain mechanisms like reward and slashing systems can be used to build verifiable reputation scores for agents, helping us discern trustworthy actors from malicious ones without central oversight.The Battle for an Open AI Future: The age-old battle between open and closed source is playing out again in the AI sphere. While centralized players currently seem to dominate, Mallory sees hope in the open-source AI movement, which could provide a crucial alternative to a future controlled by a few large entities.Contact Information*   Twitter: @McGee_noodle*   Company: Chroma

AWS - Il podcast in italiano
Cybersecurity con AWS – Confidential computing

AWS - Il podcast in italiano

Play Episode Listen Later May 5, 2025 20:39


Cosa si intende per confidential computing? Come può aiutare a proteggere i dati end-to-end? In che modo si possono proteggere i dati durante il loro processamento? Quali sono le dimensioni di protezionedei dati che il confidential computing copre? Cos'è AWS Nitro System? Oggi ne parliamo con Fabrizio Celli, Solutions Architecture Manager di AWS. Link utili:- AWS Nitro System- AWS Nitro System gets independent affirmation of its confidential compute capabilities

web3 with a16z
AI and the End of Apps (with NEAR)

web3 with a16z

Play Episode Listen Later Apr 16, 2025 62:18


with @ilblackdragon @rhhackettWelcome to web3 with a16z. I'm your host, Robert Hackett.In this episode, we're diving deep into one of the most intriguing intersections in tech today: AI and crypto.To help us unpack it, we're joined by Illia Polosukhin — co-founder of the crypto protocol NEAR and co-author of the groundbreaking 2017 "transformers" paper that kicked off the current AI boom. Ilia has been early to some of the biggest recent tech trends, and today he brings us a rare, panoramic view of the tech industry's cutting edge.Together we explore what the phrase “user-owned AI” really means; why the so-called agentic internet — that is, a world where your AI assistant talks directly to services on your behalf — might replace the very notion of websites and apps as we know them; and much more.Timestamps:(0:00) Introduction(3:40) Centralization and Challenges of AI(6:17) "User-Owned" AI(12:14) Confidential Computing and AI(17:51) The Birth of Transformers(22:33) NEAR AI and Crowdsourcing(27:56) AI Agents and Future Applications(31:04) The End of Websites and Applications(34:08) Dead Internet Theory & Distinguishing Humans(41:49) Open Source vs. Open Weight Models(43:48) Geopolitical Implications of AI(46:55) NEAR Protocol and Blockchain Scaling(59:29) The Role of Humans in an AI WorldResources:Attention is all you need by Vaswani et al. (Conference on Neural Information Processing Systems 2017)As a reminder, none of the content should be taken as investment, business, legal, or tax advice; please see a16z.com/disclosures for more important information, including a link to a list of our investments.

Accenture AI Leaders Podcast
AI Leaders Podcast #66: Gen AI and Data Privacy: A Dive into Confidential Computing

Accenture AI Leaders Podcast

Play Episode Listen Later Nov 13, 2024 32:00


In this insightful conversation, we explore how Gen AI, confidential computing and multi-party computation are transforming data sharing and privacy. Join Teresa Tung, Data Capability Lead at Accenture, along Raluca Ada Popa, Co-founder and President at Opaque Systems, and Rishabh Poddar, Co-founder and CTO. Discover how these technologies are breaking down barriers, fostering innovation, and creating new possibilities in data-driven industries.  

Microsoft Mechanics Podcast
AI apps - Control Safety, Privacy & Security - with Mark Russinovich

Microsoft Mechanics Podcast

Play Episode Listen Later Oct 24, 2024 15:47


What are prompt injection attacks and how do you stop them? How do you avoid deceptive responses? Can AI traffic be end-to-end encrypted? We'll answer these questions and more with technical demonstrations to make it real. Mark Russinovich will show you how to develop and deploy AI applications that prioritize safety, privacy, and integrity. Leverage real-time safety guardrails to filter harmful content and proactively prevent misuse, ensuring AI outputs are trustworthy. The integration of confidential inferencing enables users to maintain data privacy by encrypting information during processing, safeguarding sensitive data from exposure. Enhance AI solutions with advanced features like Groundedness detection, which provides real-time corrections to inaccurate outputs, and the Confidential Computing initiative that extends verifiable privacy across all services. Mark Russinovich, Azure CTO, joins Jeremy Chapman to share how to build secure AI applications, monitor and manage potential risks, and ensure compliance with privacy regulations.   ► QUICK LINKS: 00:00 - Keep data safe and private 01:19 - Azure AI Content Safety capability set 02:17 - Direct jailbreak attack 03:47 - Put controls in place 04:54 - Indirect prompt injection attack 05:57 - Options to monitor attacks over time 06:22 - Groundedness detection 07:45 - Privacy—Confidential Computing 09:40 - Confidential inferencing Model-as-a-service 11:31 - Ensure services and APIs are trustworthy 11:50 - Security 12:51 - Web Query Transparency 13:51 - Microsoft Defender for Cloud Apps 15:16 - Wrap up   ► Link References Check out https://aka.ms/MicrosoftTrustworthyAI  For verifiable privacy, go to our blog at https://aka.ms/ConfidentialInferencing    ► Unfamiliar with Microsoft Mechanics?  As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast   ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics  • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics

ScanNetSecurity 最新セキュリティ情報
Linux Foundation「機密コンピューティングの事例」公開

ScanNetSecurity 最新セキュリティ情報

Play Episode Listen Later Oct 22, 2024 0:12


 The Linux Foundation Japanは10月7日、調査レポート「The Case for Confidential Computing」の日本語版となる「機密コンピューティングの事例」を発表した。

Gitbar - Italian developer podcast
Ep.203 - Confidential Computing con Giorgio Natili

Gitbar - Italian developer podcast

Play Episode Listen Later Oct 18, 2024 100:28


Epicenter - Learn about Blockchain, Ethereum, Bitcoin and Distributed Technologies
Arcium: Parallelized Confidential Computing Network - Yannik Schrade

Epicenter - Learn about Blockchain, Ethereum, Bitcoin and Distributed Technologies

Play Episode Listen Later Sep 6, 2024 62:10


In this day and age, privacy and confidentiality are more important than ever. Advancements in the cryptographic research of zero knowledge proofs (ZKPs), fully homomorphic encryption (FHE) and multi-party computation (MPC) paved the way for computational integrity and confidential computing. While FHE allows for computation to be performed on encrypted data without the need for prior decryption, it is MPC that enables compliance with regulations (e.g. AML). Arcium aims to build a global super computer for parallelised confidential computing, powered by custom MXEs (multi-party computation execution environments).Topics covered in this episode:Yannik's backgroundConfidentiality & decentralised complianceConfidential computingTEEs (trusted execution environments) & side-channel attacksZKP vs. MPC vs. FHEArcium's global super computer architectureHow Arcium differentiates itself from other privacy protocolsUse casesCensorship risksEcosystem developmentEpisode links:Yannik Schrade on TwitterArcium on TwitterSponsors:Gnosis: Gnosis builds decentralized infrastructure for the Ethereum ecosystem, since 2015. This year marks the launch of Gnosis Pay— the world's first Decentralized Payment Network. Get started today at - gnosis.ioChorus1: Chorus1 is one of the largest node operators worldwide, supporting more than 100,000 delegators, across 45 networks. The recently launched OPUS allows staking up to 8,000 ETH in a single transaction. Enjoy the highest yields and institutional grade security at - chorus.oneThis episode is hosted by Sebastien Couture & Felix Lutsch.

The SysAdmin DOJO Podcast
Why Confidential Computing Matters

The SysAdmin DOJO Podcast

Play Episode Listen Later Jul 25, 2024 35:29


In this episode, host Andy is joined by Paul to provide a comprehensive overview of confidential computing - what it is, why it's important, and how it's being implemented in cloud platforms like Microsoft Azure.   Key Takeaways:  Confidential computing aims to protect data while it is being processed by the CPU or stored in memory, supplementing traditional protections like encryption of data at rest and in transit. Confidential computing can enable use cases like confidential AI model training, secure multi-party data sharing, protecting sensitive data in cloud VMs, and securing blockchain/distributed ledger systems. Establishing a root of trust from the hardware up through the software stack is critical for confidential computing.    Timestamps:  (03:00) The Need for Confidential Computing  (06:28) How Confidential Computing Works  (14:38) Trusted Execution Environments and Trusted Computing Base   (21:47) Confidential Computing in Azure and Beyond   (27:58) Confidential Computing in Apple's AI   Episode Resources: The Confidential Computing Consortium NVIDA Confidential Computing Apple's Article Watch: BlueHat IL 2024 - Ben Hania, Yair Netzer - Compromising confidential VMs and then fixing it

Crypto Hipster Podcast
Building a Parallelized Confidential Computing Network that Helps Industries with Exposure to the Most Sensitive Data Perform Encrypted Computations, with Yannik Schrade @ Arcium

Crypto Hipster Podcast

Play Episode Listen Later Jul 20, 2024 37:14


Yannik Schrade is the CEO and Co-Founder of Arcium, a parallelized confidential computing network, bringing fast, scaleable and universal encryption. As the lead architect and visionary behind Arcium, Yannik created the project by leveraging his expertise in cryptography with the goal of advancing data security and confidentiality.  A renowned thought leader, Yannik has spoken at several prominent industry conferences, including the 2024 World Economic Forum, where he challenged TradFi leaders on the importance of decentralization, privacy, and trustlessness.    He previously founded ShiftScreen, an iOS app, which attracted over 100,000 paying customers and was a regular top seller globally. Yannik studied Computer Science and Mathematics at the Technical University of Munich, and he also studied law, adding another dimension to his extensive portfolio.  --- Support this podcast: https://podcasters.spotify.com/pod/show/crypto-hipster-podcast/support

Cloud Security Podcast
What is confidential computing? Explained for 2024

Cloud Security Podcast

Play Episode Listen Later Jul 16, 2024 22:10


How can you protect your data with Confidential Compute and Containers? Ashish spoke to Zvonko Kaiser, Principal Systems Software Engineer, Confidential Containers and Kubernetes at Nvidia about confidential containers, confidential computing, and their importance in protecting sensitive data. They speak about the various threat models, use cases, and the role of GPUs in enhancing compute power for AI workloads Guest Socials:⁠ ⁠Zvonko's Linkedin Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp Questions asked: (00:00) Introduction (01:45) A word from our sponsor SentinelOne (02:18) A bit about Zvonko (02:24) Encryption for Confidential Computing (04:20) Confidential Computing vs Confidential Containers (05:45) What sectors focus on Confidential Computing? (07:09) Common Threats in Confidential Computing (08:55) What is a Secure Enclave? (10:05) Value of Attestation for Confidential Computing (11:35) Lift and Shift Strategy for AI (13:59) The role of GPU in confidential Computing (15:37) Shared Responsibility with Confidential Computing (17:10) Confidential Computing project you can get involved in (18:16) The fun section

The Tech Blog Writer Podcast
2939: Confidential Computing: Elevating AI and ML Security in the Cloud

The Tech Blog Writer Podcast

Play Episode Listen Later Jun 23, 2024 23:35


In a digital age where enterprises are tasked with protecting an extensive network of data, traditional methods of safeguarding sensitive information often fall short. Static, rules-based models for detecting data breaches rely heavily on the quality of training data, leaving gaps in security. How can organizations bolster their defenses against ever-evolving cyber threats? In today's episode of the Tech Talks Daily Podcast, we are joined by Shamim Naqvi, CEO of SafeLiShare Inc., to explore the transformative potential of Secure Enclave technology in the cloud, also known as Confidential Computing. Shamim delves into how this cutting-edge technology can enhance data security, especially when leveraging third-party AI and ML models. SafeLiShare's ConfidentialAI platform brings unprecedented security to enterprise data pipelines through digital fingerprinting and a tamper-proof, immutable ledger. This ensures comprehensive monitoring of every user, service, account, and machine, employing a zero-trust approach during runtime interactions. By integrating Confidential Computing, organizations can secure their AI workflows, pipelines, and ML operations against unauthorized access and breaches. SafeLiShare provides runtime security for AI and ML workloads through Confidential Computing, ensuring data is protected during processing. This technology secures data within isolated hardware enclaves, making it inaccessible to external threats and providing auditable logs for compliance. Achieving high levels of security with minimal performance overhead (3-5%) makes this approach feasible for extensive use. Confidential Computing is set to become pervasive across cloud and on-premises environments, driven by the increasing need for data security and regulatory compliance. Traditional encryption methods differ from Confidential Computing in that the latter protects data during processing using secure enclaves. SafeLiShare's ConfidentialAI enables the secure use of large language models by combining them with enterprise context data within secure enclaves. This addresses the main challenges in providing confidential context to public AI models while offloading key management to secure enclaves, resulting in significant security benefits. Join us for an insightful discussion with Shamim Naqvi as we unravel the complexities of data security in the AI era. How can Confidential Computing reshape your approach to protecting sensitive enterprise data? Tune in to find out, and don't forget to share your thoughts on this evolving landscape.

Ubuntu Security Podcast
Episode 230

Ubuntu Security Podcast

Play Episode Listen Later Jun 20, 2024 21:12


This week we bring you a special edition of the podcast, featuring an interview between Ijlal Loutfi and Karen Horovitz who deep-dive into Confidential Computing. Ranging from a high-level discussion of the need for and the features provided by confidential computing, through to the specifics of how this is implemented in Ubuntu and a look at similar future security technologies that are on the horizon.

TerraSpaces
Confidential Computing Evolved: Andromeda’s aOS Sparks the Next Wave

TerraSpaces

Play Episode Listen Later Jun 5, 2024


Today on the Ether we have Shade Protocol hosting Shade Spaces with a discussion on confidential computing with Andromeda. You'll hear from Red_eyed_Bear, Cody Marx Bailey, and more! Recorded on June 5th 2024. Make sure to check out the newest tracks from Finn and the RAC FM gang over at ImaginetheSmell.org! The majority of the music at the end of these spaces can be found streaming over on Spotify, and the rest of the streaming platforms. Thank you to everyone in the community who supports TerraSpaces.

The SysAdmin DOJO Podcast
Windows Server 2025: New Security Features Revealed

The SysAdmin DOJO Podcast

Play Episode Listen Later May 31, 2024 46:14


In this podcast episode, Andy and Paul discuss the upcoming release of Windows Server 2025 and the myriad security enhancements it will bring. They delve into various topics such as improvements to Active Directory, delegated managed service accounts, Kerberos protocol enhancements, SMB enhancements, hot patching, REFS file system for confidential computing, and extended security updates.   Key takeaways:  Windows Server 2025 brings a host of security enhancements.  The release date of Windows Server 2025 is speculated to be in September 2024, coinciding with the release of System Center 2025.  Timestamps:  (07:05) - Enhancements in Active Directory Security and Numa Support: A Deep Dive (13:19) - Revolutionizing Service Accounts: Delegated Managed Service Accounts Explained  (20:28) - Revamping Windows Server Security: Say Goodbye to NTLM and Hello to Kerberos  (28:15) - Revolutionizing SMB with Quick Protocol and Hot Patching in Windows Server 2025  (32:34) - Revolutionizing Patching with Hot Patching in Windows Server and Azure  (36:02) - Revolutionizing Data Protection with Resilient File System and Confidential Computing  (39:34) - Exploring Confidential Compute, Server Upgrades, and Extended Security Updates in Windows Server Environment  (42:37) - Windows Server 2025 Release Date Speculations and Future Episode Teasers  Episode Resources:  What's new in Windows Server 2025 from MS Learn

TerraSpaces
Confidential Computing on Linea

TerraSpaces

Play Episode Listen Later May 13, 2024 59:37


Today on the Ether we have Linea hosting a chat on confidential computing. You'll hear from Patrick, Alex Zaidelson, Lisa Loud,

Microsoft Mechanics Podcast
Linux on Microsoft Azure?

Microsoft Mechanics Podcast

Play Episode Listen Later Apr 19, 2024 10:08


Run Linux workloads on Azure for reliability, security, and innovation. Build your entire app in Azure, using Linux and open source services. Choose from a wide range of Linux distributions, leverage cost-saving benefits with Azure Hybrid Benefit, and get seamless integration with distros like SUSE, Ubuntu, and Red Hat. Join Azure expert, Matt McSpirit as he shares why you should run your Linux workloads on Azure, and how to ensure security of sensitive data with AI-driven threat detection, Defender for Cloud, and Confidential Computing. ► QUICK LINKS: 00:00 - Run Linux workloads on Azure 00:26 - Open source distribution 02:44 - Build apps in Azure using open source technologies 03:40 - Limitless scaling and reliability 05:40 - Deploy, manage, and extend Linux workloads on Azure 06:53 - Red Hat integration 07:40 - Open source options for compute 08:32 - Extend and modernize app experiences 09:02 - Security advantages for Linux workloads 09:47 - Wrap Up   ► Link References: Get started with Linux on Azure at https://azure.com/linux   ► Unfamiliar with Microsoft Mechanics?  As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast   ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics  • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics

Microsoft Mechanics Podcast
Is Azure the right place to run Red Hat Enterprise Linux workloads?

Microsoft Mechanics Podcast

Play Episode Listen Later Apr 4, 2024 7:16


Ensure peak performance, security and compatibility with Azure for Red Hat Enterprise Linux. Leverage Azure Migrate to transition on-prem Linux VMs to Azure, for cloud-native or hybrid deployment. Deploy and orchestrate infrastructure with Azure Resource Manager templates, Terraform, and Ansible playbooks. Uncover cost-saving opportunities and performance optimization tools, and benefit from license portability, commitment-based discounts, and diverse compute options, including Azure Confidential Computing VMs, for enhanced scalability and efficiency. Experience flexibility with Azure, enabling RHEL workloads to run across global regions and edge locations, with Azure Arc providing centralized management and security for hybrid environments. Join Azure expert, Matt McSpirit, as he shares why Azure is the right place to run your Red Hat Enterprise Linux workloads.   ► QUICK LINKS: 00:00 - Why run Red Hat Enterprise Linux workloads on Azure? 01:10 - Integration 01:41 - Automated scripting or code-based options 02:09 - Beyond provisioning 02:31 - Customer support 03:07 - Efficiency- optimize your spend 04:28 - Increase performance and scalability 05:41 - Flexibility 06:26 - Update management 06:40 - Wrap Up   ► Link References: See the Forrester Consulting study at https://aka.ms/RHELTEI For additional information check out https://aka.ms/RedHatAzure      ► Unfamiliar with Microsoft Mechanics?  As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast   ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics  • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics

Masters of Privacy
Matthias Eigenmann: Confidential Computing, contractual relationships and legal bases for Data Clean Rooms

Masters of Privacy

Play Episode Listen Later Mar 18, 2024 34:14


Will Data Clean Rooms help us avoid consent, or personal data altogether, and make the most of first-party data for data collaboration and addressability purposes? Matthias Eigenmann is a Swiss lawyer with over 10 years of practical experience in technology and data protection law. He currently works as legal counsel and DPO at Decentriq (a Data Clean Room), and is also an advisor on data protection matters to a large hospital in Switzerland. Prior to this, he spent several years working in tech and data protection law at a law firm, as well as as an in-house counsel for IT contracts and data protection at PwC Switzerland.  References: Matthias Eigenmann, Enhanced Privacy for Data Analytics Matthias Eigenmann on LinkedIn Decentriq, a Data Clean Room Damian Desfontaines: Differential Privacy in Data Clean Rooms (Masters of Privacy) Nicola Newitt: The legal case for Data Clean Rooms (Masters of Privacy)

New Cyber Frontier
NCF-336 Confidential Computing Explained

New Cyber Frontier

Play Episode Listen Later Dec 5, 2023 31:58


Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access to view the operations and extract the intellectual property or private operations of an executing process. With Confidential Computing, the process is run protected, so its operation is hidden even from the owner of the computer it is running on. Join in today and listen to some great explanations on how to protect your valuable intellectual property today.

Kubernetes Podcast from Google
Confidential Computing, with Fabian Kammel

Kubernetes Podcast from Google

Play Episode Listen Later Nov 23, 2023 53:36


Fabian Kammel is a Security Architect at ControlPlane, where he helps to make the (cloud-native) world a safer place. In his career, he continuously worked to bring hardware security and cloud-native security closer together. His past projects include: * A cloud-native PKIs for on-road vehicle services secured by enterprise HSMs * An always-encrypted Kubernetes distribution that harnesses the power of Confidential Computing * And more recently securing SPIFFE-based machine identities via hardware attestation.   Do you have something cool to share? Some questions? Let us know: - web: kubernetespodcast.com - mail: kubernetespodcast@google.com - twitter: @kubernetespod   Links from the interview Confidential Computing Blog from kubernetes.io Confidential Computing Consortium Confidential Computing Whitepaper Intel SGX Enclave Swap Memory with Kubernetes in Beta in 1.28 Hardware Security Modules Trusted Platform Modules (TPM) Envelope Encryption Confidential Computing Concepts - Confidential Virtual Machine AMD Secure Encrypted Virtualization (AMD SEV) AMD Secure Encrypted Virtualization - Secure Nested Paging (AMD SEV SNP) Trusted Computing Base (TCB) Remote Attestation Confidentiality, Integrity, and Availability: The CIA Triad Intel SGX Enclaves Confidential Containers (CoCo) Katacontainers AWS Firecracker  

The Tech Blog Writer Podcast
2553: Fortanix: Why Confidential Computing Will Be the Underlining of Training Data for AI

The Tech Blog Writer Podcast

Play Episode Listen Later Oct 22, 2023 28:04


In the rapidly evolving landscape of artificial intelligence and data science, today's episode of the Tech Talks Daily Podcast brings forth a critically important yet often overlooked aspect—securing data through its entire lifecycle. Our esteemed guest is Anand Kashyap, the CEO and Co-founder of Fortanix, a company that has pioneered in the realm of confidential computing.  Anand and his team at Fortanix have uniquely positioned themselves in the industry, focusing not just on securing stored or in-transit data, but also data while it's being processed. As AI models increasingly become the linchpins for competitive advantage, it's no longer just about the intricacies of these models but the treasure trove of data that fuels them. Giants like Google and Microsoft, armed with vast amounts of data, seem to have an edge. Yet, this edge brings its own challenges around the ethics, privacy, and compliance of using such data—questions that are resonating loudly, not just in the EU under the shadows of regulations like GDPR, but across the globe, including the US. During our conversation, Anand demystified the concept of confidential computing, a term that is gradually becoming a cornerstone in the discussion around data security. At its core, confidential computing involves leveraging hardware-based trusted execution environments to protect both data and code. One might wonder how this impacts the realm of privacy regulations. Interestingly, confidential computing provides an effective, transparent mechanism to demonstrate compliance without diminishing the operational integrity of AI models. As the conversation unfolded, Anand offered valuable insights, pointing out that while confidential computing does augment runtime security, it is not a silver bullet. The necessity for well-crafted applications and comprehensive security measures remains unabated. He emphasized that this form of computing, though robust in security mechanisms, does not negate the need for diligent application development and maintenance. We also touched upon the far-reaching implications of data privacy laws like GDPR on the global architecture of data solutions.  Anand highlighted how such regulations are catalyzing the adoption of confidential computing solutions across different jurisdictions, with an intriguing possibility of creating sovereign cloud zones within public clouds. Ethical considerations in data protection strategies occupied a significant segment of our discussion. With a discerning perspective, Anand shared his thoughts on deploying confidential computing for a myriad of new use cases, from healthcare to financial services. Anand, who continually evolves through self-education, including listening to thought-provoking podcasts, left us with an enriching viewpoint on the challenges and opportunities lying ahead in the data security spectrum. As the spotlight continues to shine on AI and data, understanding how to secure this data effectively is not just an operational need but an ethical imperative. This conversation with Anand Kashyap illuminates that pathway, shedding light on both the potential and the limitations of confidential computing.  Whether you are a business leader, a tech enthusiast, or someone deeply involved in data privacy concerns, this episode offers a comprehensive lens through which to view the evolving narrative of data security. 

AI Applied: Covering AI News, Interviews and Tools - ChatGPT, Midjourney, Runway, Poe, Anthropic
Unveiling the Game-Changer: How Confidential Computing Drives Generative AI in Enterprises

AI Applied: Covering AI News, Interviews and Tools - ChatGPT, Midjourney, Runway, Poe, Anthropic

Play Episode Listen Later Oct 22, 2023 8:58


Discover the Revolutionary Power: Learn how Confidential Computing is unleashing the potential of Generative AI within enterprises. Explore the key insights into the groundbreaking synergy that is reshaping the AI landscape for businesses. Join us to delve into the future of AI technology and data security. Get on the AI Box Waitlist: https://AIBox.ai/Join our ChatGPT Community: ⁠https://www.facebook.com/groups/739308654562189/⁠Follow me on Twitter: ⁠https://twitter.com/jaeden_ai⁠

ChatGPT: News on Open AI, MidJourney, NVIDIA, Anthropic, Open Source LLMs, Machine Learning
Confidential Computing's Transformative Role in Enterprise Generative AI

ChatGPT: News on Open AI, MidJourney, NVIDIA, Anthropic, Open Source LLMs, Machine Learning

Play Episode Listen Later Oct 22, 2023 9:09


Discover how the paradigm of confidential computing is poised to revolutionize the world of generative AI for enterprises in this enlightening episode. We explore the critical intersection of privacy and innovation, shedding light on the transformative potential of this technology. Join us to uncover the secrets behind confidential computing and its game-changing implications for the business world. Get on the AI Box Waitlist: https://AIBox.ai/Join our ChatGPT Community: ⁠https://www.facebook.com/groups/739308654562189/⁠Follow me on Twitter: ⁠https://twitter.com/jaeden_ai⁠

AI Hustle: News on Open AI, ChatGPT, Midjourney, NVIDIA, Anthropic, Open Source LLMs
Unlocking Generative AI with Confidential Computing: A Game-Changer for Enterprise

AI Hustle: News on Open AI, ChatGPT, Midjourney, NVIDIA, Anthropic, Open Source LLMs

Play Episode Listen Later Sep 23, 2023 9:20


Discover the game-changing potential of Generative AI in the enterprise world through Confidential Computing. In this episode, we delve into how Confidential Computing technology is poised to unlock the true power of AI for businesses, ensuring data privacy and security while harnessing the creative capabilities of AI models. Join us as we explore the future of AI innovation in enterprise applications. Get on the AI Box Waitlist: https://AIBox.ai/Join our ChatGPT Community: ⁠https://www.facebook.com/groups/739308654562189/⁠Follow me on Twitter: ⁠https://twitter.com/jaeden_ai⁠

The Six Five with Patrick Moorhead and Daniel Newman
Software, Security & Services with Anil Rao & Zscaler - Six Five On the Road

The Six Five with Patrick Moorhead and Daniel Newman

Play Episode Listen Later Sep 21, 2023 21:09


On this episode of The Six Five – On The Road, hosts Daniel Newman and Patrick Moorhead welcome Intel's Anil Rao, VP, GM Systems Architecture & Engineering and Zscaler's Ken Urquhart, Global Vice President of 5G Strategy for a conversation on how Intel is making aggressive plans to offer software, security, and services to its customers with initiatives like Project Amber, Confidential Computing and more. Their discussion covers: Intel's commitment to empowering developers with confidence, leveraging innovative hardware, developer software, and solutions Anil's pivotal role in driving security technology and system-architecture innovation, including oversight of the Intel Trust Authority A spotlight on Intel's client, Zscaler, and their successful implementation of Intel's Confidential Computing, along with the achieved outcomes Exploring the concept of being "secured down to the silicon" and the consequential assurance of end-to-end data protection, instilling confidence in Intel's clientele

Cyber Security Inside
171. Azure CTO Talks Confidential Computing and Confidential AI

Cyber Security Inside

Play Episode Listen Later Sep 20, 2023 35:54


In this episode of InTechnology, Camille gets into confidential computing and Intel® Trust Authority with Mark Russinovich, Technical Fellow and CTO of Microsoft Azure, and Anil Rao, VP and GM of Systems Architecture and Engineering in the Office of the CTO at Intel. They talk about the definitions of confidential computing and confidential AI, how Microsoft Azure is using Intel® Trust Authority, data sovereignty, and code transparency. They also discuss the democratization of AI and future concerns about AI as it continues to grow.   The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.

The BlueHat Podcast
Deciphering Privacy in the Age of AI: An Expert Discussion

The BlueHat Podcast

Play Episode Listen Later Sep 6, 2023 42:43


Giovanni Cherubin and Ahmed Salem join Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Giovanni is a Senior Researcher in Machine Learning and Security at Microsoft Research Cambridge, and Ahmed is a researcher in Confidential Computing at the Microsoft Research lab in Cambridge, UK. They're both interested in artificial intelligence and are researching the privacy, security, fairness, and accountability risks of the different machine learning settings. In this episode, they discuss how to identify and address privacy threats in machine learning models, the connection between privacy and information leakage, and how privacy is perceived in academia and industry.In This Episode You Will Learn: Algorithmic procedures for describing threats and attacksThe rapid growth of machine learning research in attacks and defenseThe framework for fostering collaboration and understanding within the fieldSome Questions We Ask: What are the main threats you are currently focused on? Who will benefit from this research besides academics and researchers?Can you explain the concept of privacy as it relates to information leakage?Resources: View Giovanni Cherubin on LinkedInView Ahmed Salem on LinkedInView Wendy Zenone on LinkedInView Nic Fillingham on LinkedInDiscover and follow other Microsoft podcasts at microsoft.com/podcasts Hosted on Acast. See acast.com/privacy for more information.

ITSPmagazine | Technology. Cybersecurity. Society
Voice of the Future: Exploring AI, Speech Tech, Ethics, and Regulations | A conversation with Nigel Cannings | Redefining Society with Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 24, 2023 42:17


Guest/s Name ✨Nigel Cannings, CTO at Intelligent Voice [@intelligentvox]Bio ✨Nigel Cannings is the CTO at Intelligent Voice. He has over 25 years' experience in both Law and Technology, is the founder of Intelligent Voice Ltd and a pioneer in all things voice. Nigel is also a regular speaker at industry events such as NVIDIA GTC and holds multiple patents in Speech, NLP and Confidential Computing technologies.  He is an Industrial Fellow at the University of East London.On Linkedin | https://www.linkedin.com/in/nigelcannings/?originalSubdomain=ukGoogle Scholar | https://scholar.google.co.uk/citations?user=zHL1sngAAAAJ&hl=en____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak

Category Visionaries
Ayal Yogev, CEO and Co-Founder of Anjuna: $42 Million to Build The Future of Confidential Computing

Category Visionaries

Play Episode Listen Later Aug 24, 2023 27:18


In today's episode of Category Visionaries, we speak with Ayal Yogev, CEO and Co-founder of Anjuna, a confidential computing platform that has raised $42 Million in funding. Topics Discussed: Ayal's 25 years of experience in enterprise security and product management and number one life lesson from his time in the Israeli military: everything is possible. His admiration for Satya Nadella, CEO of Microsoft, and Mark Zuckerberg, CEO of Facebook, despite Mark's controversial persona. The story of how he built Anjuna and met Yan Michalevsky, his Co-founder who also served in Israeli intelligence then did Ph.D. in Stanford before they both decided to develop Anjuna together. Security is an enabler. Ayal believes that 80% of security problems are due to access to infrastructure and confidential computing could be a solution to this issue. Why massive enterprise's transition to the cloud put Anjuna's software in high demand

@HPCpodcast with Shahin Khan and Doug Black

New in the @HPCpodcast, a weekly news show, 3-5 min, on important industry news. LLNL El Capitan, LLNL Director Kim Budil named as one of the Most Creative People in Business for 2023 by Fast Company, Inflection AI's 22k GPU system, NYS DFS AI, Intel & Nvidia collaborate on Confidential Computing, Photonics News, Linux Wars [audio mp3="https://orionx.net/wp-content/uploads/2023/07/HPCNB_20230710.mp3"][/audio] The post HPC News Bytes – 20230710 appeared first on OrionX.net.

AI Chat: ChatGPT & AI News, Artificial Intelligence, OpenAI, Machine Learning
How Confidential Computing Will Unlock Generative AI for Enterprise

AI Chat: ChatGPT & AI News, Artificial Intelligence, OpenAI, Machine Learning

Play Episode Listen Later Jul 1, 2023 9:21


In this episode, we delve into the transformative potential of generative AI and the new security challenges it presents, exploring how confidential computing provides a novel solution to these concerns. Discover how this innovative technology is revolutionizing data security, fostering trust in AI systems, and paving the way for responsible and secure innovation across industries. Podcast: Inflection AI Raises $1.5B: Thinks Ecology is More Important Than Human Life Report: Inflection AI Report + Transcript Get on the AI Box Waitlist: https://AIBox.ai/Investor Contact Email: jaeden@aibox.aiFacebook Community: ⁠https://www.facebook.com/groups/739308654562189/⁠ Discord Community: https://discord.gg/hHw4naQr Follow me on Twitter: ⁠https://twitter.com/jaeden_ai

Embracing Digital Transformation
#143 Use Cases in Confidential Computing

Embracing Digital Transformation

Play Episode Listen Later Jun 15, 2023 18:47


In this episode of Embracing Digital Transformation Dr. Anna Scott continues her conversation with Ibett Acarapi and Jesse Schrater about Confidential Computing and their uses in AI, and software development. Video: Blog: https://www.embracingdigital.org/episode-EDT143

Embracing Digital Transformation
#142 Data Protection with Confidential Computing

Embracing Digital Transformation

Play Episode Listen Later Jun 8, 2023 24:31


In this episode Dr. Anna Scott interviews Jesse Schrater and Ibett Acarapi about how to protect data using confidential computing.

The Azure Security Podcast
Episode 78: Entra Permissions Management updates

The Azure Security Podcast

Play Episode Listen Later Jun 2, 2023 32:13


In this episode Michael and Gladys talk with guests Marcelo di lorio and Neil Walker about all the latest news in Entra Permissions Management.We also cover the latest Azure security news about Microsoft Build, Confidential Computing, Key Vault, SQL MI, and Azure Content Safety and more.

Cloud Security Podcast by Google
EP121 What Happens Here Stays Here: Confidential City (and Space)

Cloud Security Podcast by Google

Play Episode Listen Later May 15, 2023 31:22


Guests:  Nelly Porter, Group Product Manager, Google Cloud Rene Kolga, Senior Product Manager, Google Cloud Topics: Could you remind our listeners what confidential computing is? What threats does this stop? Are these common at our clients?  Are there other use cases for this technology like compliance or sovereignty? We have a new addition to our Confidential Computing family - Confidential Space. Could you tell us how it came about? What new use cases does this bring for clients? Resources: “Confidentially Speaking” (ep1) “Confidentially Speaking 2: Cloudful of Secrets” (ep48) “Introducing Confidential Space to help unlock the value of secure data collaboration” Confidential Space security overview “The Is How They Tell Me The World Ends” by Nicole Perlroth NIST 800-233 “High-Performance Computing (HPC) Security: Architecture, Threat Analysis, and Security Posture”

All TWiT.tv Shows (MP3)
FLOSS Weekly 731: Confidential Computing

All TWiT.tv Shows (MP3)

Play Episode Listen Later May 10, 2023 64:59


Dan Middleton, of Intel and the Confidential Computing Consortium (CCC), dives deep on the topic of confidential computing (CoCo) and many related concerns, such as Trusted Execution Environments with Doc Searls and Jonathan Bennett. Hosts: Doc Searls and Jonathan Bennett Guest: Dan Middleton Download or subscribe to this show at https://twit.tv/shows/floss-weekly Think your open source project should be on FLOSS Weekly? Email floss@twit.tv. Thanks to Lullabot's Jeff Robbins, web designer and musician, for our theme music. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

FLOSS Weekly (MP3)
FLOSS Weekly 731: Confidential Computing - Dan Middleton, Confidential Computing Consortium

FLOSS Weekly (MP3)

Play Episode Listen Later May 10, 2023 64:59


Dan Middleton, of Intel and the Confidential Computing Consortium (CCC), dives deep on the topic of confidential computing (CoCo) and many related concerns, such as Trusted Execution Environments with Doc Searls and Jonathan Bennett. Hosts: Doc Searls and Jonathan Bennett Guest: Dan Middleton Download or subscribe to this show at https://twit.tv/shows/floss-weekly Think your open source project should be on FLOSS Weekly? Email floss@twit.tv. Thanks to Lullabot's Jeff Robbins, web designer and musician, for our theme music. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

FLOSS Weekly (Video HD)
FLOSS Weekly 731: Confidential Computing - Dan Middleton, Confidential Computing Consortium

FLOSS Weekly (Video HD)

Play Episode Listen Later May 10, 2023 64:58


Dan Middleton, of Intel and the Confidential Computing Consortium (CCC), dives deep on the topic of confidential computing (CoCo) and many related concerns, such as Trusted Execution Environments with Doc Searls and Jonathan Bennett. Hosts: Doc Searls and Jonathan Bennett Guest: Dan Middleton Download or subscribe to this show at https://twit.tv/shows/floss-weekly Think your open source project should be on FLOSS Weekly? Email floss@twit.tv. Thanks to Lullabot's Jeff Robbins, web designer and musician, for our theme music. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

WIRED Security: News, Advice, and More
Intel Let Google Cloud Hack Its New Secure Chips and Found 10 Bugs

WIRED Security: News, Advice, and More

Play Episode Listen Later Apr 25, 2023 5:28


To protect its Confidential Computing cloud infrastructure, Google leans on its relationships with chipmakers to gain unusual insight into hardware. Read the story here.

The Robot Brains Podcast
Raluca Ada Popa: data privacy, AI, enclaves, confidential computing

The Robot Brains Podcast

Play Episode Listen Later Apr 12, 2023 56:08


Raluca Ada Popa from UC Berkeley, Opaque Systems, PreVeil joins Host Pieter Abbeel to discuss data privacy and AI, cloud enclaves, confidential and encrypted computing, differential privacy, PreVeil, and Opaque Systems. SUBSCRIBE TO THE ROBOT BRAINS PODCAST TODAY | Visit therobotbrains.ai and follow us on YouTube at TheRobotBrainsPodcast and Twitter @therobotbrains. Hosted on Acast. See acast.com/privacy for more information.

Sustain
Episode 162: Colin Eberhardt & Eriol Fox at State of Open Con 2023

Sustain

Play Episode Listen Later Mar 28, 2023 36:37


Guest Colin Eberhardt | Eriol Fox Panelist Richard Littauer Show Notes Hello and welcome to Sustain! The podcast where we talk about sustaining open source for the long haul. Richard is at the State of Open Con 2023 UK in London, and he's excited to have his first ever in-person podcasts. Today, he has two guests joining him. His first guest is Colin Eberhardt, who's Technology Director at Scott Logic, and a Board Member of FINOS. Colin tells us about some of his favorite talks at this event, what he learned about Confidential Computing, and his thoughts on open source being described as public good. His next guest is Eriol Fox, who's Richard's co-host on the Sustain Open Source Design Podcast. Eriol works at Superbloom, previously Simply Secure, which we'll hear more about that branding change, what Superbloom does, and some cool things they've been working on there. We'll also find out about the sessions they did at this event on financial topics around open source and succession planning. Download this episode now to hear much more! [00:02:03] Colin tells us what he's doing at State of Open Con and how it's going. [00:03:51] We hear about Colin's talk, other talks he enjoyed, and what Confidential Computing is. [00:09:18] There was a fantastic talk about Wikipedia by the Founder, Jimmy Wales, and Colin shares some great takeaways from that talk. [00:14:15] We're going a little off topic, but no worries. Colin talks about being annoyed when he sees people siting a claim that ChatGPT is going to be the end of software engineering in the future, and Richard and Colin share their thoughts. [00:15:21] Why does Colin disagree with open source being described as public good? [00:19:44] Find out where you can follow Colin on the web. [00:21:02] His next guest is Eriol Fox, and they tell us about the sessions they did on financial related topics around open source, which apparently was a busy session. They mention several projects said that they were investing in usability improvements, which was great to hear. [00:23:04] The second session was on succession planning, what that talk was about, and how many people attended. [00:24:50] Eriol explains what Superbloom does, what they do at Superbloom, the rebranding from Simply Secure, as well as some cool things they worked on there. [00:33:52] Find out where you can follow Eriol and Superbloom on the web. Links SustainOSS (https://sustainoss.org/) SustainOSS Twitter (https://twitter.com/SustainOSS?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor) SustainOSS Discourse (https://discourse.sustainoss.org/) podcast@sustainoss.org (mailto:podcast@sustainoss.org) Richard Littauer Twitter (https://twitter.com/richlitt?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor) Colin Eberhardt Twitter (https://twitter.com/colineberhardt?lang=en) Colin Eberhardt Blog (https://blog.scottlogic.com/ceberhardt/) Colin Eberhardt GitHub (https://github.com/ColinEberhardt) Scott Logic (https://www.scottlogic.com/) FINOS (https://www.finos.org/) Eriol Fox Twitter (https://twitter.com/EriolDoesDesign?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor) Eriol Fox Website (https://erioldoesdesign.github.io/) Eriol Fox hachyderm (https://hachyderm.io/@erioldoesdesign) Eriol Fox GitHub (https://github.com/Erioldoesdesign) Superbloom (https://superbloom.design/) Credits Produced by Richard Littauer (https://www.burntfen.com/) Edited by Paul M. Bahr at Peachtree Sound (https://www.peachtreesound.com/) Show notes by DeAnn Bahr Peachtree Sound (https://www.peachtreesound.com/) Special Guests: Colin Eberhardt and Eriol Fox.

Paul's Security Weekly
ESW #310 - Shamim Naqvi, Grace Burkard

Paul's Security Weekly

Play Episode Listen Later Mar 24, 2023 148:56


SafeLiShare delivers tamperproof security from inside out across clouds and eliminate algorithmic complexity attacks and reverse never-ending cycles of defense using policy controlled Confidential Computing with secure enclave technology. Segment Resources: Presentation - https://1drv.ms/p/s!AqqNWej5CK8uhEoIZW5MUxMTQLJU Blog - https://safelishare.com/blog/defining-confidential-computing/ Video - https://safelishare.com/data-privacy-resources/   The ioXt Alliance is a group of manufacturers, industry alliances, labs, and government organizations, dedicated to harmonizing best security practices and establishing testable standards. Our goal is to bring security, upgradability and transparency to the market and directly into the hands of consumers. Come learn about Smart Product security and what consumers should be asking for. Segment Resources: https://www.ioxtalliance.org/   This week in the Enterprise News: Dope Security nabs $16M led by GV to build out secure web gateways designed to work on endpoints, not in the cloud, Introducing Microsoft 365 Copilot: your copilot for work, A Tweet from Daniel Feldman, A simple test, given to both GPT 3.5 and GPT 4, AI Hires a Human to Solve Captcha, Because It Couldn't Solve It Itself, You know what's different between AI and you? Those goosebumps on your arms right now and the ice water in your veins. AI can't do that. Amazing Invention- This Drone Will Change Everything, & Cyber Startup Buzzword Bingo: 2023 Edition    Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw310

Enterprise Security Weekly (Audio)
ESW #310 - Shamim Naqvi, Grace Burkard

Enterprise Security Weekly (Audio)

Play Episode Listen Later Mar 24, 2023 148:56


SafeLiShare delivers tamperproof security from inside out across clouds and eliminate algorithmic complexity attacks and reverse never-ending cycles of defense using policy controlled Confidential Computing with secure enclave technology. Segment Resources: Presentation - https://1drv.ms/p/s!AqqNWej5CK8uhEoIZW5MUxMTQLJU Blog - https://safelishare.com/blog/defining-confidential-computing/ Video - https://safelishare.com/data-privacy-resources/   The ioXt Alliance is a group of manufacturers, industry alliances, labs, and government organizations, dedicated to harmonizing best security practices and establishing testable standards. Our goal is to bring security, upgradability and transparency to the market and directly into the hands of consumers. Come learn about Smart Product security and what consumers should be asking for. Segment Resources: https://www.ioxtalliance.org/   This week in the Enterprise News: Dope Security nabs $16M led by GV to build out secure web gateways designed to work on endpoints, not in the cloud, Introducing Microsoft 365 Copilot: your copilot for work, A Tweet from Daniel Feldman, A simple test, given to both GPT 3.5 and GPT 4, AI Hires a Human to Solve Captcha, Because It Couldn't Solve It Itself, You know what's different between AI and you? Those goosebumps on your arms right now and the ice water in your veins. AI can't do that. Amazing Invention- This Drone Will Change Everything, & Cyber Startup Buzzword Bingo: 2023 Edition    Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw310

Paul's Security Weekly TV
Eliminate Attack Surface from Inside Out - Shamim Naqvi - ESW #310

Paul's Security Weekly TV

Play Episode Listen Later Mar 24, 2023 43:12


SafeLiShare delivers tamperproof security from inside out across clouds and eliminate algorithmic complexity attacks and reverse never-ending cycles of defense using policy controlled Confidential Computing with secure enclave technology.   Segment Resources: Presentation - https://1drv.ms/p/s!AqqNWej5CK8uhEoIZW5MUxMTQLJU Blog - https://safelishare.com/blog/defining-confidential-computing/ Video - https://safelishare.com/data-privacy-resources/   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw310

Partially Redacted: Data Privacy, Security & Compliance
Confidential Computing and Secure Enclaves with AWS's Arvind Raghu

Partially Redacted: Data Privacy, Security & Compliance

Play Episode Listen Later Mar 15, 2023 39:04


For years engineers have relied on encryption at rest and transit to help protect sensitive data. However, historically data needs to be decrypted to actually use it, which risks the potential exposure of the underlying data. Confidential computing is a computing paradigm that aims to protect data in use, not just data in transit or at rest. The goal of confidential computing is to provide a secure computing environment where sensitive data can be processed without the risk of exposure or compromise. AWS Nitro Enclaves is a service provided by Amazon Web Services (AWS) that enables customers to create isolated compute environments within their Amazon Elastic Compute Cloud (EC2) instances. In a Nitro Enclave, the application code and data are encrypted and processed inside the enclave, ensuring that they are protected from both the hypervisor and the host operating system. This makes Nitro Enclaves ideal for workloads that require a high level of security, such as confidential computing, secure machine learning, and blockchain-based applications. Arvind Rague, Principal Specialist in EC2 and Confidential Computing at AWS, joins the show to explain confidential computing, AWS Nitro Enclaves, and the use cases this technology unlocks. Topics: What is confidential computing? What's the motivation behind the investment in this technology? What are some of the problems this approach to privacy and security solves that were previously a potential vulnerability for companies? How does a hardware-based trusted execution environment prevent a bad actor from executing unauthorized code? How is the memory space protected? Can you explain how Nitro Enclaves enhance the security of confidential computing on AWS? What's the process for using Nitro Enclaves versus a standard EC2 instance How do I go about using Nitro Enclave for performing an operation on sensitive data? What does the programming process look like to do that? What are some use cases that you've seen that you are particularly excited about? How can Nitro Enclaves be used to protect sensitive data in specific use cases, such as financial services or healthcare? Are there any limitations or trade-offs to consider when using Nitro Enclaves for confidential computing? What innovations or business directions do you think secure enclaves will enable in the future? What's next for Nitro Enclaves? Anything you can share? Where do you see the area of confidential computing going in the next 5-10 years? Resources: Introducing Unified ID 2.0 Private Operator Services on AWS Using Nitro Enclaves

Security Visionaries
Looking Forward to 2023: Predictions and Resolutions

Security Visionaries

Play Episode Listen Later Jan 3, 2023 35:38


This episode features Mike Anderson leading a roundtable discussion with Ilona Simpson, Chief Information Officer EMEA at Netskope and David Fairman, Chief Information & Chief Security Officer APAC at Netskope.In this episode, Ilona and David share their predictions and resolutions for cybersecurity in 2023. You'll hear predictions about the industrial metaverse, confidential computing, quantified risk reduction plans, and convergence of priorities for security teams.-----------------“If you think about cybersecurity, we are just a subset of a broader operational risk. Operational risk actually has a much better approach or a little bit more maturity in being able to quantify operational risk in the organization. CISOs need to be able to stand toe-to-toe and be able to have a discussion at parity in regards to risk buydown for this subset of operational risk. And that's really where we are. I think as an industry, as a practice, as a profession, we need to get much smarter at figuring out how do we make this a much more quantitative conversation.” – David Fairman-----------------Episode Timestamps:*(02:47) - Prediction & Resolution: The Industrial Metaverse*(12:23) - Prediction & Resolution: Confidential Computing *(17:54) - Prediction & Resolution: Quantified Risk Reduction Plans*(25:27) - Prediction & Resolution: Convergence of Priorities as a Result of Transformation*(30:38) - Mike's Prediction: Vendor Consolidation-----------------Links:Connect with Ilona on LinkedInConnect with David on LinkedInConnect with Mike Anderson LinkedInwww.netskope.com

AWS Morning Brief
Confidential Computing Is a Cloud Paranoia-Based Wasteland

AWS Morning Brief

Play Episode Listen Later Oct 5, 2022 7:00


Want to give your ears a break and read this as an article? You're looking for this link.https://www.lastweekinaws.com/blog/confidential-computing-is-for-the-tinfoil-hat-brigadeWant to watch the full dramatic reenactment of this podcast? Watch the YouTube Video here: https://youtu.be/z_jD64jGhhINever miss an episode Join the Last Week in AWS newsletter Subscribe wherever you get your podcasts Help the show Leave a review Share your feedback Subscribe wherever you get your podcasts Buy our merch https://store.lastweekinaws.comWhat's Corey up to? Follow Corey on Twitter (@quinnypig) See our recent work at the Duckbill Group Apply to work with Corey and the Duckbill Group to help lower your AWS bill

The Data Exchange with Ben Lorica
Confidential Computing for Machine Learning

The Data Exchange with Ben Lorica

Play Episode Listen Later Sep 15, 2022 36:20


Sadegh Riazi is CEO and co-founder of CipherMode Labs, a startup building tools that enable data and machine learning teams to build and deploy models directly on encrypted data. CipherMode's new open source project enables teams to develop and deploy machine learning algorithms using familiar tools, and thus opens up the possibility of using sensitive data in different scenarios both within an organization, and in cooperation with other organizations.Download a FREE copy of our recent 2022 Trends Report (Data, Machine Learning, AI):  https://gradientflow.com/2022trendsreport/Subscribe: Apple • Android • Spotify • Stitcher • Google • AntennaPod • RSS.Detailed show notes can be found on The Data Exchange web site.