POPULARITY
I, Stewart Alsop, had a fascinating conversation on this episode of Crazy Wisdom with Mallory McGee, the founder of Chroma, who is doing some really interesting work at the intersection of AI and crypto. We dove deep into how these two powerful technologies might reshape the internet and our interactions with it, moving beyond the hype cycles to what's truly foundational.Check out this GPT we trained on the conversationTimestamps00:00 The Intersection of AI and Crypto01:28 Bitcoin's Origins and Austrian Economics04:35 AI's Centralization Problem and the New Gatekeepers09:58 Agent Interactions and Decentralized Databases for Trustless Transactions11:11 AI as a Prosthetic Mind and the Interpretability Challenge15:12 Deterministic Blockchains vs. Non-Deterministic AI Intents18:44 The Demise of Traditional Apps in an Agent-Driven World35:07 Property Rights, Agent Registries, and Blockchains as BackendsKey InsightsCrypto's Enduring Fundamentals: Mallory emphasized that while crypto prices are often noise, the underlying fundamentals point to a new, long-term cycle for the Internet itself. It's about decentralizing control, a core principle stemming from Bitcoin's original blend of economics and technology.AI's Centralization Dilemma: We discussed the concerning trend of AI development consolidating power within a few major players. This, as Mallory pointed out, ironically mirrors the very centralization crypto aims to dismantle, potentially shifting control from governments to a new set of tech monopolies.Agents are the Future of Interaction: Mallory envisions a future where most digital interactions aren't human-to-LLM, but agent-to-agent. These autonomous agents will require decentralized, trustless platforms like blockchains to transact, hold assets, and communicate confidentially.Bridging Non-Deterministic AI with Deterministic Blockchains: A fascinating challenge Mallory highlighted is translating the non-deterministic "intents" of AI (e.g., an agent's goal to "get me a good return on spare cash") into the deterministic transactions required by blockchains. This translation layer is crucial for agents to operate effectively on-chain.The Decline of Traditional Apps: Mallory made a bold claim that traditional apps and web interfaces are on their way out. As AI agents become capable of generating personalized interfaces on the fly, the need for standardized, pre-built apps will diminish, leading to a world where software is hyper-personalized and often ephemeral.Blockchains as Agent Backbones: We explored the intriguing idea that blockchains might be inherently better suited for AI agents than for direct human use. Their deterministic nature, ability to handle assets, and potential for trustless reputation systems make them ideal backends for an agent-centric internet.Trust and Reputation for Agents: In a world teeming with AI agents, establishing trust is paramount. Mallory suggested that on-chain mechanisms like reward and slashing systems can be used to build verifiable reputation scores for agents, helping us discern trustworthy actors from malicious ones without central oversight.The Battle for an Open AI Future: The age-old battle between open and closed source is playing out again in the AI sphere. While centralized players currently seem to dominate, Mallory sees hope in the open-source AI movement, which could provide a crucial alternative to a future controlled by a few large entities.Contact Information* Twitter: @McGee_noodle* Company: Chroma
Cosa si intende per confidential computing? Come può aiutare a proteggere i dati end-to-end? In che modo si possono proteggere i dati durante il loro processamento? Quali sono le dimensioni di protezionedei dati che il confidential computing copre? Cos'è AWS Nitro System? Oggi ne parliamo con Fabrizio Celli, Solutions Architecture Manager di AWS. Link utili:- AWS Nitro System- AWS Nitro System gets independent affirmation of its confidential compute capabilities
with @ilblackdragon @rhhackettWelcome to web3 with a16z. I'm your host, Robert Hackett.In this episode, we're diving deep into one of the most intriguing intersections in tech today: AI and crypto.To help us unpack it, we're joined by Illia Polosukhin — co-founder of the crypto protocol NEAR and co-author of the groundbreaking 2017 "transformers" paper that kicked off the current AI boom. Ilia has been early to some of the biggest recent tech trends, and today he brings us a rare, panoramic view of the tech industry's cutting edge.Together we explore what the phrase “user-owned AI” really means; why the so-called agentic internet — that is, a world where your AI assistant talks directly to services on your behalf — might replace the very notion of websites and apps as we know them; and much more.Timestamps:(0:00) Introduction(3:40) Centralization and Challenges of AI(6:17) "User-Owned" AI(12:14) Confidential Computing and AI(17:51) The Birth of Transformers(22:33) NEAR AI and Crowdsourcing(27:56) AI Agents and Future Applications(31:04) The End of Websites and Applications(34:08) Dead Internet Theory & Distinguishing Humans(41:49) Open Source vs. Open Weight Models(43:48) Geopolitical Implications of AI(46:55) NEAR Protocol and Blockchain Scaling(59:29) The Role of Humans in an AI WorldResources:Attention is all you need by Vaswani et al. (Conference on Neural Information Processing Systems 2017)As a reminder, none of the content should be taken as investment, business, legal, or tax advice; please see a16z.com/disclosures for more important information, including a link to a list of our investments.
In this insightful conversation, we explore how Gen AI, confidential computing and multi-party computation are transforming data sharing and privacy. Join Teresa Tung, Data Capability Lead at Accenture, along Raluca Ada Popa, Co-founder and President at Opaque Systems, and Rishabh Poddar, Co-founder and CTO. Discover how these technologies are breaking down barriers, fostering innovation, and creating new possibilities in data-driven industries.
What are prompt injection attacks and how do you stop them? How do you avoid deceptive responses? Can AI traffic be end-to-end encrypted? We'll answer these questions and more with technical demonstrations to make it real. Mark Russinovich will show you how to develop and deploy AI applications that prioritize safety, privacy, and integrity. Leverage real-time safety guardrails to filter harmful content and proactively prevent misuse, ensuring AI outputs are trustworthy. The integration of confidential inferencing enables users to maintain data privacy by encrypting information during processing, safeguarding sensitive data from exposure. Enhance AI solutions with advanced features like Groundedness detection, which provides real-time corrections to inaccurate outputs, and the Confidential Computing initiative that extends verifiable privacy across all services. Mark Russinovich, Azure CTO, joins Jeremy Chapman to share how to build secure AI applications, monitor and manage potential risks, and ensure compliance with privacy regulations. ► QUICK LINKS: 00:00 - Keep data safe and private 01:19 - Azure AI Content Safety capability set 02:17 - Direct jailbreak attack 03:47 - Put controls in place 04:54 - Indirect prompt injection attack 05:57 - Options to monitor attacks over time 06:22 - Groundedness detection 07:45 - Privacy—Confidential Computing 09:40 - Confidential inferencing Model-as-a-service 11:31 - Ensure services and APIs are trustworthy 11:50 - Security 12:51 - Web Query Transparency 13:51 - Microsoft Defender for Cloud Apps 15:16 - Wrap up ► Link References Check out https://aka.ms/MicrosoftTrustworthyAI For verifiable privacy, go to our blog at https://aka.ms/ConfidentialInferencing ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
The Linux Foundation Japanは10月7日、調査レポート「The Case for Confidential Computing」の日本語版となる「機密コンピューティングの事例」を発表した。
Epicenter - Learn about Blockchain, Ethereum, Bitcoin and Distributed Technologies
In this day and age, privacy and confidentiality are more important than ever. Advancements in the cryptographic research of zero knowledge proofs (ZKPs), fully homomorphic encryption (FHE) and multi-party computation (MPC) paved the way for computational integrity and confidential computing. While FHE allows for computation to be performed on encrypted data without the need for prior decryption, it is MPC that enables compliance with regulations (e.g. AML). Arcium aims to build a global super computer for parallelised confidential computing, powered by custom MXEs (multi-party computation execution environments).Topics covered in this episode:Yannik's backgroundConfidentiality & decentralised complianceConfidential computingTEEs (trusted execution environments) & side-channel attacksZKP vs. MPC vs. FHEArcium's global super computer architectureHow Arcium differentiates itself from other privacy protocolsUse casesCensorship risksEcosystem developmentEpisode links:Yannik Schrade on TwitterArcium on TwitterSponsors:Gnosis: Gnosis builds decentralized infrastructure for the Ethereum ecosystem, since 2015. This year marks the launch of Gnosis Pay— the world's first Decentralized Payment Network. Get started today at - gnosis.ioChorus1: Chorus1 is one of the largest node operators worldwide, supporting more than 100,000 delegators, across 45 networks. The recently launched OPUS allows staking up to 8,000 ETH in a single transaction. Enjoy the highest yields and institutional grade security at - chorus.oneThis episode is hosted by Sebastien Couture & Felix Lutsch.
In this episode, host Andy is joined by Paul to provide a comprehensive overview of confidential computing - what it is, why it's important, and how it's being implemented in cloud platforms like Microsoft Azure. Key Takeaways: Confidential computing aims to protect data while it is being processed by the CPU or stored in memory, supplementing traditional protections like encryption of data at rest and in transit. Confidential computing can enable use cases like confidential AI model training, secure multi-party data sharing, protecting sensitive data in cloud VMs, and securing blockchain/distributed ledger systems. Establishing a root of trust from the hardware up through the software stack is critical for confidential computing. Timestamps: (03:00) The Need for Confidential Computing (06:28) How Confidential Computing Works (14:38) Trusted Execution Environments and Trusted Computing Base (21:47) Confidential Computing in Azure and Beyond (27:58) Confidential Computing in Apple's AI Episode Resources: The Confidential Computing Consortium NVIDA Confidential Computing Apple's Article Watch: BlueHat IL 2024 - Ben Hania, Yair Netzer - Compromising confidential VMs and then fixing it
Yannik Schrade is the CEO and Co-Founder of Arcium, a parallelized confidential computing network, bringing fast, scaleable and universal encryption. As the lead architect and visionary behind Arcium, Yannik created the project by leveraging his expertise in cryptography with the goal of advancing data security and confidentiality. A renowned thought leader, Yannik has spoken at several prominent industry conferences, including the 2024 World Economic Forum, where he challenged TradFi leaders on the importance of decentralization, privacy, and trustlessness. He previously founded ShiftScreen, an iOS app, which attracted over 100,000 paying customers and was a regular top seller globally. Yannik studied Computer Science and Mathematics at the Technical University of Munich, and he also studied law, adding another dimension to his extensive portfolio. --- Support this podcast: https://podcasters.spotify.com/pod/show/crypto-hipster-podcast/support
How can you protect your data with Confidential Compute and Containers? Ashish spoke to Zvonko Kaiser, Principal Systems Software Engineer, Confidential Containers and Kubernetes at Nvidia about confidential containers, confidential computing, and their importance in protecting sensitive data. They speak about the various threat models, use cases, and the role of GPUs in enhancing compute power for AI workloads Guest Socials: Zvonko's Linkedin Podcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - Cloud Security Podcast- Youtube - Cloud Security Newsletter - Cloud Security BootCamp Questions asked: (00:00) Introduction (01:45) A word from our sponsor SentinelOne (02:18) A bit about Zvonko (02:24) Encryption for Confidential Computing (04:20) Confidential Computing vs Confidential Containers (05:45) What sectors focus on Confidential Computing? (07:09) Common Threats in Confidential Computing (08:55) What is a Secure Enclave? (10:05) Value of Attestation for Confidential Computing (11:35) Lift and Shift Strategy for AI (13:59) The role of GPU in confidential Computing (15:37) Shared Responsibility with Confidential Computing (17:10) Confidential Computing project you can get involved in (18:16) The fun section
In a digital age where enterprises are tasked with protecting an extensive network of data, traditional methods of safeguarding sensitive information often fall short. Static, rules-based models for detecting data breaches rely heavily on the quality of training data, leaving gaps in security. How can organizations bolster their defenses against ever-evolving cyber threats? In today's episode of the Tech Talks Daily Podcast, we are joined by Shamim Naqvi, CEO of SafeLiShare Inc., to explore the transformative potential of Secure Enclave technology in the cloud, also known as Confidential Computing. Shamim delves into how this cutting-edge technology can enhance data security, especially when leveraging third-party AI and ML models. SafeLiShare's ConfidentialAI platform brings unprecedented security to enterprise data pipelines through digital fingerprinting and a tamper-proof, immutable ledger. This ensures comprehensive monitoring of every user, service, account, and machine, employing a zero-trust approach during runtime interactions. By integrating Confidential Computing, organizations can secure their AI workflows, pipelines, and ML operations against unauthorized access and breaches. SafeLiShare provides runtime security for AI and ML workloads through Confidential Computing, ensuring data is protected during processing. This technology secures data within isolated hardware enclaves, making it inaccessible to external threats and providing auditable logs for compliance. Achieving high levels of security with minimal performance overhead (3-5%) makes this approach feasible for extensive use. Confidential Computing is set to become pervasive across cloud and on-premises environments, driven by the increasing need for data security and regulatory compliance. Traditional encryption methods differ from Confidential Computing in that the latter protects data during processing using secure enclaves. SafeLiShare's ConfidentialAI enables the secure use of large language models by combining them with enterprise context data within secure enclaves. This addresses the main challenges in providing confidential context to public AI models while offloading key management to secure enclaves, resulting in significant security benefits. Join us for an insightful discussion with Shamim Naqvi as we unravel the complexities of data security in the AI era. How can Confidential Computing reshape your approach to protecting sensitive enterprise data? Tune in to find out, and don't forget to share your thoughts on this evolving landscape.
This week we bring you a special edition of the podcast, featuring an interview between Ijlal Loutfi and Karen Horovitz who deep-dive into Confidential Computing. Ranging from a high-level discussion of the need for and the features provided by confidential computing, through to the specifics of how this is implemented in Ubuntu and a look at similar future security technologies that are on the horizon.
Today on the Ether we have Shade Protocol hosting Shade Spaces with a discussion on confidential computing with Andromeda. You'll hear from Red_eyed_Bear, Cody Marx Bailey, and more! Recorded on June 5th 2024. Make sure to check out the newest tracks from Finn and the RAC FM gang over at ImaginetheSmell.org! The majority of the music at the end of these spaces can be found streaming over on Spotify, and the rest of the streaming platforms. Thank you to everyone in the community who supports TerraSpaces.
In this podcast episode, Andy and Paul discuss the upcoming release of Windows Server 2025 and the myriad security enhancements it will bring. They delve into various topics such as improvements to Active Directory, delegated managed service accounts, Kerberos protocol enhancements, SMB enhancements, hot patching, REFS file system for confidential computing, and extended security updates. Key takeaways: Windows Server 2025 brings a host of security enhancements. The release date of Windows Server 2025 is speculated to be in September 2024, coinciding with the release of System Center 2025. Timestamps: (07:05) - Enhancements in Active Directory Security and Numa Support: A Deep Dive (13:19) - Revolutionizing Service Accounts: Delegated Managed Service Accounts Explained (20:28) - Revamping Windows Server Security: Say Goodbye to NTLM and Hello to Kerberos (28:15) - Revolutionizing SMB with Quick Protocol and Hot Patching in Windows Server 2025 (32:34) - Revolutionizing Patching with Hot Patching in Windows Server and Azure (36:02) - Revolutionizing Data Protection with Resilient File System and Confidential Computing (39:34) - Exploring Confidential Compute, Server Upgrades, and Extended Security Updates in Windows Server Environment (42:37) - Windows Server 2025 Release Date Speculations and Future Episode Teasers Episode Resources: What's new in Windows Server 2025 from MS Learn
Today on the Ether we have Linea hosting a chat on confidential computing. You'll hear from Patrick, Alex Zaidelson, Lisa Loud,
Run Linux workloads on Azure for reliability, security, and innovation. Build your entire app in Azure, using Linux and open source services. Choose from a wide range of Linux distributions, leverage cost-saving benefits with Azure Hybrid Benefit, and get seamless integration with distros like SUSE, Ubuntu, and Red Hat. Join Azure expert, Matt McSpirit as he shares why you should run your Linux workloads on Azure, and how to ensure security of sensitive data with AI-driven threat detection, Defender for Cloud, and Confidential Computing. ► QUICK LINKS: 00:00 - Run Linux workloads on Azure 00:26 - Open source distribution 02:44 - Build apps in Azure using open source technologies 03:40 - Limitless scaling and reliability 05:40 - Deploy, manage, and extend Linux workloads on Azure 06:53 - Red Hat integration 07:40 - Open source options for compute 08:32 - Extend and modernize app experiences 09:02 - Security advantages for Linux workloads 09:47 - Wrap Up ► Link References: Get started with Linux on Azure at https://azure.com/linux ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
Ensure peak performance, security and compatibility with Azure for Red Hat Enterprise Linux. Leverage Azure Migrate to transition on-prem Linux VMs to Azure, for cloud-native or hybrid deployment. Deploy and orchestrate infrastructure with Azure Resource Manager templates, Terraform, and Ansible playbooks. Uncover cost-saving opportunities and performance optimization tools, and benefit from license portability, commitment-based discounts, and diverse compute options, including Azure Confidential Computing VMs, for enhanced scalability and efficiency. Experience flexibility with Azure, enabling RHEL workloads to run across global regions and edge locations, with Azure Arc providing centralized management and security for hybrid environments. Join Azure expert, Matt McSpirit, as he shares why Azure is the right place to run your Red Hat Enterprise Linux workloads. ► QUICK LINKS: 00:00 - Why run Red Hat Enterprise Linux workloads on Azure? 01:10 - Integration 01:41 - Automated scripting or code-based options 02:09 - Beyond provisioning 02:31 - Customer support 03:07 - Efficiency- optimize your spend 04:28 - Increase performance and scalability 05:41 - Flexibility 06:26 - Update management 06:40 - Wrap Up ► Link References: See the Forrester Consulting study at https://aka.ms/RHELTEI For additional information check out https://aka.ms/RedHatAzure ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
Will Data Clean Rooms help us avoid consent, or personal data altogether, and make the most of first-party data for data collaboration and addressability purposes? Matthias Eigenmann is a Swiss lawyer with over 10 years of practical experience in technology and data protection law. He currently works as legal counsel and DPO at Decentriq (a Data Clean Room), and is also an advisor on data protection matters to a large hospital in Switzerland. Prior to this, he spent several years working in tech and data protection law at a law firm, as well as as an in-house counsel for IT contracts and data protection at PwC Switzerland. References: Matthias Eigenmann, Enhanced Privacy for Data Analytics Matthias Eigenmann on LinkedIn Decentriq, a Data Clean Room Damian Desfontaines: Differential Privacy in Data Clean Rooms (Masters of Privacy) Nicola Newitt: The legal case for Data Clean Rooms (Masters of Privacy)
Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access to view the operations and extract the intellectual property or private operations of an executing process. With Confidential Computing, the process is run protected, so its operation is hidden even from the owner of the computer it is running on. Join in today and listen to some great explanations on how to protect your valuable intellectual property today.
Fabian Kammel is a Security Architect at ControlPlane, where he helps to make the (cloud-native) world a safer place. In his career, he continuously worked to bring hardware security and cloud-native security closer together. His past projects include: * A cloud-native PKIs for on-road vehicle services secured by enterprise HSMs * An always-encrypted Kubernetes distribution that harnesses the power of Confidential Computing * And more recently securing SPIFFE-based machine identities via hardware attestation. Do you have something cool to share? Some questions? Let us know: - web: kubernetespodcast.com - mail: kubernetespodcast@google.com - twitter: @kubernetespod Links from the interview Confidential Computing Blog from kubernetes.io Confidential Computing Consortium Confidential Computing Whitepaper Intel SGX Enclave Swap Memory with Kubernetes in Beta in 1.28 Hardware Security Modules Trusted Platform Modules (TPM) Envelope Encryption Confidential Computing Concepts - Confidential Virtual Machine AMD Secure Encrypted Virtualization (AMD SEV) AMD Secure Encrypted Virtualization - Secure Nested Paging (AMD SEV SNP) Trusted Computing Base (TCB) Remote Attestation Confidentiality, Integrity, and Availability: The CIA Triad Intel SGX Enclaves Confidential Containers (CoCo) Katacontainers AWS Firecracker
In the rapidly evolving landscape of artificial intelligence and data science, today's episode of the Tech Talks Daily Podcast brings forth a critically important yet often overlooked aspect—securing data through its entire lifecycle. Our esteemed guest is Anand Kashyap, the CEO and Co-founder of Fortanix, a company that has pioneered in the realm of confidential computing. Anand and his team at Fortanix have uniquely positioned themselves in the industry, focusing not just on securing stored or in-transit data, but also data while it's being processed. As AI models increasingly become the linchpins for competitive advantage, it's no longer just about the intricacies of these models but the treasure trove of data that fuels them. Giants like Google and Microsoft, armed with vast amounts of data, seem to have an edge. Yet, this edge brings its own challenges around the ethics, privacy, and compliance of using such data—questions that are resonating loudly, not just in the EU under the shadows of regulations like GDPR, but across the globe, including the US. During our conversation, Anand demystified the concept of confidential computing, a term that is gradually becoming a cornerstone in the discussion around data security. At its core, confidential computing involves leveraging hardware-based trusted execution environments to protect both data and code. One might wonder how this impacts the realm of privacy regulations. Interestingly, confidential computing provides an effective, transparent mechanism to demonstrate compliance without diminishing the operational integrity of AI models. As the conversation unfolded, Anand offered valuable insights, pointing out that while confidential computing does augment runtime security, it is not a silver bullet. The necessity for well-crafted applications and comprehensive security measures remains unabated. He emphasized that this form of computing, though robust in security mechanisms, does not negate the need for diligent application development and maintenance. We also touched upon the far-reaching implications of data privacy laws like GDPR on the global architecture of data solutions. Anand highlighted how such regulations are catalyzing the adoption of confidential computing solutions across different jurisdictions, with an intriguing possibility of creating sovereign cloud zones within public clouds. Ethical considerations in data protection strategies occupied a significant segment of our discussion. With a discerning perspective, Anand shared his thoughts on deploying confidential computing for a myriad of new use cases, from healthcare to financial services. Anand, who continually evolves through self-education, including listening to thought-provoking podcasts, left us with an enriching viewpoint on the challenges and opportunities lying ahead in the data security spectrum. As the spotlight continues to shine on AI and data, understanding how to secure this data effectively is not just an operational need but an ethical imperative. This conversation with Anand Kashyap illuminates that pathway, shedding light on both the potential and the limitations of confidential computing. Whether you are a business leader, a tech enthusiast, or someone deeply involved in data privacy concerns, this episode offers a comprehensive lens through which to view the evolving narrative of data security.
AI Applied: Covering AI News, Interviews and Tools - ChatGPT, Midjourney, Runway, Poe, Anthropic
Discover the Revolutionary Power: Learn how Confidential Computing is unleashing the potential of Generative AI within enterprises. Explore the key insights into the groundbreaking synergy that is reshaping the AI landscape for businesses. Join us to delve into the future of AI technology and data security. Get on the AI Box Waitlist: https://AIBox.ai/Join our ChatGPT Community: https://www.facebook.com/groups/739308654562189/Follow me on Twitter: https://twitter.com/jaeden_ai
ChatGPT: News on Open AI, MidJourney, NVIDIA, Anthropic, Open Source LLMs, Machine Learning
Discover how the paradigm of confidential computing is poised to revolutionize the world of generative AI for enterprises in this enlightening episode. We explore the critical intersection of privacy and innovation, shedding light on the transformative potential of this technology. Join us to uncover the secrets behind confidential computing and its game-changing implications for the business world. Get on the AI Box Waitlist: https://AIBox.ai/Join our ChatGPT Community: https://www.facebook.com/groups/739308654562189/Follow me on Twitter: https://twitter.com/jaeden_ai
AI Hustle: News on Open AI, ChatGPT, Midjourney, NVIDIA, Anthropic, Open Source LLMs
Discover the game-changing potential of Generative AI in the enterprise world through Confidential Computing. In this episode, we delve into how Confidential Computing technology is poised to unlock the true power of AI for businesses, ensuring data privacy and security while harnessing the creative capabilities of AI models. Join us as we explore the future of AI innovation in enterprise applications. Get on the AI Box Waitlist: https://AIBox.ai/Join our ChatGPT Community: https://www.facebook.com/groups/739308654562189/Follow me on Twitter: https://twitter.com/jaeden_ai
On this episode of The Six Five – On The Road, hosts Daniel Newman and Patrick Moorhead welcome Intel's Anil Rao, VP, GM Systems Architecture & Engineering and Zscaler's Ken Urquhart, Global Vice President of 5G Strategy for a conversation on how Intel is making aggressive plans to offer software, security, and services to its customers with initiatives like Project Amber, Confidential Computing and more. Their discussion covers: Intel's commitment to empowering developers with confidence, leveraging innovative hardware, developer software, and solutions Anil's pivotal role in driving security technology and system-architecture innovation, including oversight of the Intel Trust Authority A spotlight on Intel's client, Zscaler, and their successful implementation of Intel's Confidential Computing, along with the achieved outcomes Exploring the concept of being "secured down to the silicon" and the consequential assurance of end-to-end data protection, instilling confidence in Intel's clientele
In this episode of InTechnology, Camille gets into confidential computing and Intel® Trust Authority with Mark Russinovich, Technical Fellow and CTO of Microsoft Azure, and Anil Rao, VP and GM of Systems Architecture and Engineering in the Office of the CTO at Intel. They talk about the definitions of confidential computing and confidential AI, how Microsoft Azure is using Intel® Trust Authority, data sovereignty, and code transparency. They also discuss the democratization of AI and future concerns about AI as it continues to grow. The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.
Giovanni Cherubin and Ahmed Salem join Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Giovanni is a Senior Researcher in Machine Learning and Security at Microsoft Research Cambridge, and Ahmed is a researcher in Confidential Computing at the Microsoft Research lab in Cambridge, UK. They're both interested in artificial intelligence and are researching the privacy, security, fairness, and accountability risks of the different machine learning settings. In this episode, they discuss how to identify and address privacy threats in machine learning models, the connection between privacy and information leakage, and how privacy is perceived in academia and industry.In This Episode You Will Learn: Algorithmic procedures for describing threats and attacksThe rapid growth of machine learning research in attacks and defenseThe framework for fostering collaboration and understanding within the fieldSome Questions We Ask: What are the main threats you are currently focused on? Who will benefit from this research besides academics and researchers?Can you explain the concept of privacy as it relates to information leakage?Resources: View Giovanni Cherubin on LinkedInView Ahmed Salem on LinkedInView Wendy Zenone on LinkedInView Nic Fillingham on LinkedInDiscover and follow other Microsoft podcasts at microsoft.com/podcasts Hosted on Acast. See acast.com/privacy for more information.
Guest/s Name ✨Nigel Cannings, CTO at Intelligent Voice [@intelligentvox]Bio ✨Nigel Cannings is the CTO at Intelligent Voice. He has over 25 years' experience in both Law and Technology, is the founder of Intelligent Voice Ltd and a pioneer in all things voice. Nigel is also a regular speaker at industry events such as NVIDIA GTC and holds multiple patents in Speech, NLP and Confidential Computing technologies. He is an Industrial Fellow at the University of East London.On Linkedin | https://www.linkedin.com/in/nigelcannings/?originalSubdomain=ukGoogle Scholar | https://scholar.google.co.uk/citations?user=zHL1sngAAAAJ&hl=en____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak
In today's episode of Category Visionaries, we speak with Ayal Yogev, CEO and Co-founder of Anjuna, a confidential computing platform that has raised $42 Million in funding. Topics Discussed: Ayal's 25 years of experience in enterprise security and product management and number one life lesson from his time in the Israeli military: everything is possible. His admiration for Satya Nadella, CEO of Microsoft, and Mark Zuckerberg, CEO of Facebook, despite Mark's controversial persona. The story of how he built Anjuna and met Yan Michalevsky, his Co-founder who also served in Israeli intelligence then did Ph.D. in Stanford before they both decided to develop Anjuna together. Security is an enabler. Ayal believes that 80% of security problems are due to access to infrastructure and confidential computing could be a solution to this issue. Why massive enterprise's transition to the cloud put Anjuna's software in high demand
New in the @HPCpodcast, a weekly news show, 3-5 min, on important industry news. LLNL El Capitan, LLNL Director Kim Budil named as one of the Most Creative People in Business for 2023 by Fast Company, Inflection AI's 22k GPU system, NYS DFS AI, Intel & Nvidia collaborate on Confidential Computing, Photonics News, Linux Wars [audio mp3="https://orionx.net/wp-content/uploads/2023/07/HPCNB_20230710.mp3"][/audio] The post HPC News Bytes – 20230710 appeared first on OrionX.net.
AI Chat: ChatGPT & AI News, Artificial Intelligence, OpenAI, Machine Learning
In this episode, we delve into the transformative potential of generative AI and the new security challenges it presents, exploring how confidential computing provides a novel solution to these concerns. Discover how this innovative technology is revolutionizing data security, fostering trust in AI systems, and paving the way for responsible and secure innovation across industries. Podcast: Inflection AI Raises $1.5B: Thinks Ecology is More Important Than Human Life Report: Inflection AI Report + Transcript Get on the AI Box Waitlist: https://AIBox.ai/Investor Contact Email: jaeden@aibox.aiFacebook Community: https://www.facebook.com/groups/739308654562189/ Discord Community: https://discord.gg/hHw4naQr Follow me on Twitter: https://twitter.com/jaeden_ai
In this episode of Embracing Digital Transformation Dr. Anna Scott continues her conversation with Ibett Acarapi and Jesse Schrater about Confidential Computing and their uses in AI, and software development. Video: Blog: https://www.embracingdigital.org/episode-EDT143
In this episode Dr. Anna Scott interviews Jesse Schrater and Ibett Acarapi about how to protect data using confidential computing.
In this episode Michael and Gladys talk with guests Marcelo di lorio and Neil Walker about all the latest news in Entra Permissions Management.We also cover the latest Azure security news about Microsoft Build, Confidential Computing, Key Vault, SQL MI, and Azure Content Safety and more.
Guests: Nelly Porter, Group Product Manager, Google Cloud Rene Kolga, Senior Product Manager, Google Cloud Topics: Could you remind our listeners what confidential computing is? What threats does this stop? Are these common at our clients? Are there other use cases for this technology like compliance or sovereignty? We have a new addition to our Confidential Computing family - Confidential Space. Could you tell us how it came about? What new use cases does this bring for clients? Resources: “Confidentially Speaking” (ep1) “Confidentially Speaking 2: Cloudful of Secrets” (ep48) “Introducing Confidential Space to help unlock the value of secure data collaboration” Confidential Space security overview “The Is How They Tell Me The World Ends” by Nicole Perlroth NIST 800-233 “High-Performance Computing (HPC) Security: Architecture, Threat Analysis, and Security Posture”
Dan Middleton, of Intel and the Confidential Computing Consortium (CCC), dives deep on the topic of confidential computing (CoCo) and many related concerns, such as Trusted Execution Environments with Doc Searls and Jonathan Bennett. Hosts: Doc Searls and Jonathan Bennett Guest: Dan Middleton Download or subscribe to this show at https://twit.tv/shows/floss-weekly Think your open source project should be on FLOSS Weekly? Email floss@twit.tv. Thanks to Lullabot's Jeff Robbins, web designer and musician, for our theme music. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
Dan Middleton, of Intel and the Confidential Computing Consortium (CCC), dives deep on the topic of confidential computing (CoCo) and many related concerns, such as Trusted Execution Environments with Doc Searls and Jonathan Bennett. Hosts: Doc Searls and Jonathan Bennett Guest: Dan Middleton Download or subscribe to this show at https://twit.tv/shows/floss-weekly Think your open source project should be on FLOSS Weekly? Email floss@twit.tv. Thanks to Lullabot's Jeff Robbins, web designer and musician, for our theme music. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
Dan Middleton, of Intel and the Confidential Computing Consortium (CCC), dives deep on the topic of confidential computing (CoCo) and many related concerns, such as Trusted Execution Environments with Doc Searls and Jonathan Bennett. Hosts: Doc Searls and Jonathan Bennett Guest: Dan Middleton Download or subscribe to this show at https://twit.tv/shows/floss-weekly Think your open source project should be on FLOSS Weekly? Email floss@twit.tv. Thanks to Lullabot's Jeff Robbins, web designer and musician, for our theme music. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
To protect its Confidential Computing cloud infrastructure, Google leans on its relationships with chipmakers to gain unusual insight into hardware. Read the story here.
Raluca Ada Popa from UC Berkeley, Opaque Systems, PreVeil joins Host Pieter Abbeel to discuss data privacy and AI, cloud enclaves, confidential and encrypted computing, differential privacy, PreVeil, and Opaque Systems. SUBSCRIBE TO THE ROBOT BRAINS PODCAST TODAY | Visit therobotbrains.ai and follow us on YouTube at TheRobotBrainsPodcast and Twitter @therobotbrains. Hosted on Acast. See acast.com/privacy for more information.
Guest Colin Eberhardt | Eriol Fox Panelist Richard Littauer Show Notes Hello and welcome to Sustain! The podcast where we talk about sustaining open source for the long haul. Richard is at the State of Open Con 2023 UK in London, and he's excited to have his first ever in-person podcasts. Today, he has two guests joining him. His first guest is Colin Eberhardt, who's Technology Director at Scott Logic, and a Board Member of FINOS. Colin tells us about some of his favorite talks at this event, what he learned about Confidential Computing, and his thoughts on open source being described as public good. His next guest is Eriol Fox, who's Richard's co-host on the Sustain Open Source Design Podcast. Eriol works at Superbloom, previously Simply Secure, which we'll hear more about that branding change, what Superbloom does, and some cool things they've been working on there. We'll also find out about the sessions they did at this event on financial topics around open source and succession planning. Download this episode now to hear much more! [00:02:03] Colin tells us what he's doing at State of Open Con and how it's going. [00:03:51] We hear about Colin's talk, other talks he enjoyed, and what Confidential Computing is. [00:09:18] There was a fantastic talk about Wikipedia by the Founder, Jimmy Wales, and Colin shares some great takeaways from that talk. [00:14:15] We're going a little off topic, but no worries. Colin talks about being annoyed when he sees people siting a claim that ChatGPT is going to be the end of software engineering in the future, and Richard and Colin share their thoughts. [00:15:21] Why does Colin disagree with open source being described as public good? [00:19:44] Find out where you can follow Colin on the web. [00:21:02] His next guest is Eriol Fox, and they tell us about the sessions they did on financial related topics around open source, which apparently was a busy session. They mention several projects said that they were investing in usability improvements, which was great to hear. [00:23:04] The second session was on succession planning, what that talk was about, and how many people attended. [00:24:50] Eriol explains what Superbloom does, what they do at Superbloom, the rebranding from Simply Secure, as well as some cool things they worked on there. [00:33:52] Find out where you can follow Eriol and Superbloom on the web. Links SustainOSS (https://sustainoss.org/) SustainOSS Twitter (https://twitter.com/SustainOSS?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor) SustainOSS Discourse (https://discourse.sustainoss.org/) podcast@sustainoss.org (mailto:podcast@sustainoss.org) Richard Littauer Twitter (https://twitter.com/richlitt?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor) Colin Eberhardt Twitter (https://twitter.com/colineberhardt?lang=en) Colin Eberhardt Blog (https://blog.scottlogic.com/ceberhardt/) Colin Eberhardt GitHub (https://github.com/ColinEberhardt) Scott Logic (https://www.scottlogic.com/) FINOS (https://www.finos.org/) Eriol Fox Twitter (https://twitter.com/EriolDoesDesign?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor) Eriol Fox Website (https://erioldoesdesign.github.io/) Eriol Fox hachyderm (https://hachyderm.io/@erioldoesdesign) Eriol Fox GitHub (https://github.com/Erioldoesdesign) Superbloom (https://superbloom.design/) Credits Produced by Richard Littauer (https://www.burntfen.com/) Edited by Paul M. Bahr at Peachtree Sound (https://www.peachtreesound.com/) Show notes by DeAnn Bahr Peachtree Sound (https://www.peachtreesound.com/) Special Guests: Colin Eberhardt and Eriol Fox.
SafeLiShare delivers tamperproof security from inside out across clouds and eliminate algorithmic complexity attacks and reverse never-ending cycles of defense using policy controlled Confidential Computing with secure enclave technology. Segment Resources: Presentation - https://1drv.ms/p/s!AqqNWej5CK8uhEoIZW5MUxMTQLJU Blog - https://safelishare.com/blog/defining-confidential-computing/ Video - https://safelishare.com/data-privacy-resources/ The ioXt Alliance is a group of manufacturers, industry alliances, labs, and government organizations, dedicated to harmonizing best security practices and establishing testable standards. Our goal is to bring security, upgradability and transparency to the market and directly into the hands of consumers. Come learn about Smart Product security and what consumers should be asking for. Segment Resources: https://www.ioxtalliance.org/ This week in the Enterprise News: Dope Security nabs $16M led by GV to build out secure web gateways designed to work on endpoints, not in the cloud, Introducing Microsoft 365 Copilot: your copilot for work, A Tweet from Daniel Feldman, A simple test, given to both GPT 3.5 and GPT 4, AI Hires a Human to Solve Captcha, Because It Couldn't Solve It Itself, You know what's different between AI and you? Those goosebumps on your arms right now and the ice water in your veins. AI can't do that. Amazing Invention- This Drone Will Change Everything, & Cyber Startup Buzzword Bingo: 2023 Edition Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw310
SafeLiShare delivers tamperproof security from inside out across clouds and eliminate algorithmic complexity attacks and reverse never-ending cycles of defense using policy controlled Confidential Computing with secure enclave technology. Segment Resources: Presentation - https://1drv.ms/p/s!AqqNWej5CK8uhEoIZW5MUxMTQLJU Blog - https://safelishare.com/blog/defining-confidential-computing/ Video - https://safelishare.com/data-privacy-resources/ The ioXt Alliance is a group of manufacturers, industry alliances, labs, and government organizations, dedicated to harmonizing best security practices and establishing testable standards. Our goal is to bring security, upgradability and transparency to the market and directly into the hands of consumers. Come learn about Smart Product security and what consumers should be asking for. Segment Resources: https://www.ioxtalliance.org/ This week in the Enterprise News: Dope Security nabs $16M led by GV to build out secure web gateways designed to work on endpoints, not in the cloud, Introducing Microsoft 365 Copilot: your copilot for work, A Tweet from Daniel Feldman, A simple test, given to both GPT 3.5 and GPT 4, AI Hires a Human to Solve Captcha, Because It Couldn't Solve It Itself, You know what's different between AI and you? Those goosebumps on your arms right now and the ice water in your veins. AI can't do that. Amazing Invention- This Drone Will Change Everything, & Cyber Startup Buzzword Bingo: 2023 Edition Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw310
SafeLiShare delivers tamperproof security from inside out across clouds and eliminate algorithmic complexity attacks and reverse never-ending cycles of defense using policy controlled Confidential Computing with secure enclave technology. Segment Resources: Presentation - https://1drv.ms/p/s!AqqNWej5CK8uhEoIZW5MUxMTQLJU Blog - https://safelishare.com/blog/defining-confidential-computing/ Video - https://safelishare.com/data-privacy-resources/ Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw310
Nextcloud moves to the front of the pack with their new release, a moment to appreciate curl, and Amazon goes all in with Fedora. Special Guest: Brent Gervais.
For years engineers have relied on encryption at rest and transit to help protect sensitive data. However, historically data needs to be decrypted to actually use it, which risks the potential exposure of the underlying data. Confidential computing is a computing paradigm that aims to protect data in use, not just data in transit or at rest. The goal of confidential computing is to provide a secure computing environment where sensitive data can be processed without the risk of exposure or compromise. AWS Nitro Enclaves is a service provided by Amazon Web Services (AWS) that enables customers to create isolated compute environments within their Amazon Elastic Compute Cloud (EC2) instances. In a Nitro Enclave, the application code and data are encrypted and processed inside the enclave, ensuring that they are protected from both the hypervisor and the host operating system. This makes Nitro Enclaves ideal for workloads that require a high level of security, such as confidential computing, secure machine learning, and blockchain-based applications. Arvind Rague, Principal Specialist in EC2 and Confidential Computing at AWS, joins the show to explain confidential computing, AWS Nitro Enclaves, and the use cases this technology unlocks. Topics: What is confidential computing? What's the motivation behind the investment in this technology? What are some of the problems this approach to privacy and security solves that were previously a potential vulnerability for companies? How does a hardware-based trusted execution environment prevent a bad actor from executing unauthorized code? How is the memory space protected? Can you explain how Nitro Enclaves enhance the security of confidential computing on AWS? What's the process for using Nitro Enclaves versus a standard EC2 instance How do I go about using Nitro Enclave for performing an operation on sensitive data? What does the programming process look like to do that? What are some use cases that you've seen that you are particularly excited about? How can Nitro Enclaves be used to protect sensitive data in specific use cases, such as financial services or healthcare? Are there any limitations or trade-offs to consider when using Nitro Enclaves for confidential computing? What innovations or business directions do you think secure enclaves will enable in the future? What's next for Nitro Enclaves? Anything you can share? Where do you see the area of confidential computing going in the next 5-10 years? Resources: Introducing Unified ID 2.0 Private Operator Services on AWS Using Nitro Enclaves
This episode features Mike Anderson leading a roundtable discussion with Ilona Simpson, Chief Information Officer EMEA at Netskope and David Fairman, Chief Information & Chief Security Officer APAC at Netskope.In this episode, Ilona and David share their predictions and resolutions for cybersecurity in 2023. You'll hear predictions about the industrial metaverse, confidential computing, quantified risk reduction plans, and convergence of priorities for security teams.-----------------“If you think about cybersecurity, we are just a subset of a broader operational risk. Operational risk actually has a much better approach or a little bit more maturity in being able to quantify operational risk in the organization. CISOs need to be able to stand toe-to-toe and be able to have a discussion at parity in regards to risk buydown for this subset of operational risk. And that's really where we are. I think as an industry, as a practice, as a profession, we need to get much smarter at figuring out how do we make this a much more quantitative conversation.” – David Fairman-----------------Episode Timestamps:*(02:47) - Prediction & Resolution: The Industrial Metaverse*(12:23) - Prediction & Resolution: Confidential Computing *(17:54) - Prediction & Resolution: Quantified Risk Reduction Plans*(25:27) - Prediction & Resolution: Convergence of Priorities as a Result of Transformation*(30:38) - Mike's Prediction: Vendor Consolidation-----------------Links:Connect with Ilona on LinkedInConnect with David on LinkedInConnect with Mike Anderson LinkedInwww.netskope.com
Want to give your ears a break and read this as an article? You're looking for this link.https://www.lastweekinaws.com/blog/confidential-computing-is-for-the-tinfoil-hat-brigadeWant to watch the full dramatic reenactment of this podcast? Watch the YouTube Video here: https://youtu.be/z_jD64jGhhINever miss an episode Join the Last Week in AWS newsletter Subscribe wherever you get your podcasts Help the show Leave a review Share your feedback Subscribe wherever you get your podcasts Buy our merch https://store.lastweekinaws.comWhat's Corey up to? Follow Corey on Twitter (@quinnypig) See our recent work at the Duckbill Group Apply to work with Corey and the Duckbill Group to help lower your AWS bill
Sadegh Riazi is CEO and co-founder of CipherMode Labs, a startup building tools that enable data and machine learning teams to build and deploy models directly on encrypted data. CipherMode's new open source project enables teams to develop and deploy machine learning algorithms using familiar tools, and thus opens up the possibility of using sensitive data in different scenarios both within an organization, and in cooperation with other organizations.Download a FREE copy of our recent 2022 Trends Report (Data, Machine Learning, AI): https://gradientflow.com/2022trendsreport/Subscribe: Apple • Android • Spotify • Stitcher • Google • AntennaPod • RSS.Detailed show notes can be found on The Data Exchange web site.