Skip to content

Confidential Computing and Trusted Execution Environments | Intel Technology

Play Video

How can I trust my data in the cloud to not be accessed? How do I protect it while I’m using it?

In this What That Means video, Camille continues to dive into the idea of confidential computing and trust execution environments with Ron Perez, Intel Fellow, Chief Security Architect, CTO Office.

You’ll learn: 

  • What confidential computing and trust execution environments are.
  • Why we need them, and what data needs to be inside them.
  • How confidential computing works in something like the cloud.
  • Balancing security with usage and effectiveness using confidential computing.
  • And more!

Check it out. For more information, previous podcasts, and full versions, visit our website at https://cybersecurityinside.com  

#confidentialcomputing #cloud #cybersecurity

—–

If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms.

Apple Podcast: https://podcasts.apple.com/us/podcast/cyber-security-inside-podcast/id1526572021 

Spotify: https://open.spotify.com/show/6RN4ATo5ZDGvgaEj8rLep7?si=EQyu5_A0RvaEDGMdmiiRug 

 

Follow our hosts Tom Garrison and Camille Morhardt:

Tom: @tommgarrison

Camille: @morhardt

 

Learn more about Intel Cybersecurity:

https://www.intel.com/content/www/us/en/security/overview.html 

Intel Compute Life Cycle (CLA):

https://www.intel.com/content/www/us/en/security/compute-lifecycle-assurance.html