An Easy Path to Confidential Computing

To counter the ever-increasing likelihood of catastrophic disruption and cost due to enterprise IT security threats, data center decision makers need to be vigilant in protecting their organization’s data. Confidential Computing is architected to provide security for data in use to meet this critical need for enterprises today.

The next webcast in our Confidential Computing series is “How to Easily Deploy Confidential Computing.” It will provide insight into how data center, cloud and edge applications may easily benefit from cost-effective, real-world Confidential Computing solutions. This educational discussion on July 28, 2021 will provide end-user examples, tips on how to assess systems before and after deployment, as well as key steps to complete along the journey to mitigate threat exposure.  Presenting will be Steve Van Lare (Anjuna), Anand Kashyap (Fortanix), and Michael Hoard (Intel), who will discuss:

Read More

Confidential Computing FAQ

Recently, the SNIA Cloud Storage Technologies Initiative (CSTI) I hosted a lively panel discussion “What is Confidential Computing and Why Should I Care?” It was the first in a 3-part series of Confidential Computing security discussions. You can learn about the series here.  The webcast featured three experts who are working to define the Confidential Computing architecture, Mike Bursell of the Enarx Project, David Kaplan at AMD, and Ronald Perez from Intel.

This session served as an introduction to the concept of Confidential Computing and examined the technology and its initial uses. The audience asked several interesting questions. We’re answering some of the more basic questions here, as well as some that did not get addressed directly during the live event.

Q. What is Confidential Computing?  How does it complement existing security efforts, such as the Trusted Platform Model (TPM)?

Read More

The Confidential Computing Webcast Series

The need for improved data security and privacy seems to grow bigger every day. The continuous attacks and bad actors from hackers and rogue governments are increasing the demand from businesses and consumers alike to make stronger data protection a top priority. In the midst of this need, Confidential Computing has emerged as a solution for stronger data security and is gaining traction from a variety of start-ups and established companies. 

The SNIA Cloud Storage Technologies Initiative (CSTI) will be presenting a series of new webcasts on Confidential Computing. This three-part series will provide an introduction to Confidential Computing, dive into its unique approach for protecting data in use as well as use cases. I will be hosting the first discussion “What is Confidential Computing and Why Should I Care?” on June 9, 2021 featuring Mike Bursell, Co-founder, Enarx Project; David Kaplan of AMD and Ronald Perez at Intel – all members of the Confidential Computing Consortium. This panel discussion will detail the need for Confidential Computing, explain the technology basics, how it’s used, and why you should consider deploying some of these new concepts. These industry-expert panelists are the architects of Confidential Computing and they will be ready to take your questions. I encourage you to register today.

The second session “Confidential Compute: Protecting Data in Use” will follow two weeks later on June 23, 2021 with a focus on how Confidential Computing works in multi-tenant cloud environments and how sensitive data can be isolated from other privileged portions of the stack. It will also provide insight on applications in financial services, healthcare industries, and broader enterprise applications. Glyn Bowden of HPE will moderate this session with our expert presenters Paul O’Neill and Parviz Peiravi from Intel. You can register here for this session.

Read More

What is Confidential Computing?

While data security in the enterprise has never been for the faint of heart, the move to a more contiguous enterprise/cloud workflow as well as the increase in Edge data processing has significantly impacted the work (and the blood pressure) of security professionals. In the “arms race” of security, new defensive tactics are always needed. One significant approach is Confidential Computing: a technology that can isolate data and execution in a secure space on a system, which takes the concept of security to new levels. This SNIA Cloud Storage Technologies Initiative (CSTI) webcast “What is Confidential Computing and Why Should I Care?” will provide an introduction and explanation of Confidential Computing and will feature a panel of industry architects responsible for defining Confidential Compute. It will be a lively conversation on topics including:

Read More

Where Does Cyber Insurance Fit in Your Security Strategy?

Protection against cyber threats is recognized as a necessary component of an effective risk management approach, typically based on a well-known cybersecurity framework. A growing area to further mitigate risks and provide organizations with the high level of protection they need is cyber insurance. However, it’s not as simple as buying a pre-packaged policy. In fact, it’s critical to identify what risks and conditions are excluded from a cyber insurance policy before you buy.

Determining what kind of cyber insurance your business needs or if the policy you have will really cover you in the event of an incident is challenging. On August 27, 2020 the SNIA Cloud Storage Technologies Initiative (CSTI) will host a live webcast, “Does Your Storage Need a Cyber Insurance Tune-Up?” where we’ll examine how cyber insurance fits in a risk management program.

We’ll identify key terms and conditions that should be understood and carefully negotiated as cyber insurance policies may not cover all types of losses.

Read More