Customers are worried about security as they move their workloads to the Cloud and confidential computing can help address these concerns. Most customers want an independent entity to verify the trusted execution environment to ensure it is trustworthy for when data is in use. That trust authority is what we call Project Amber.
In this episode of Cyber Security Inside Live from The Green Room, Camille talks with Raghu Yeluri, Intel Senior Principal Engineer and Lead Security Architect from Intel’s Vision Conference in Texas.
You’ll learn:
•A high-level definition of Project Amber and overview of what confidential computing is.
•At the core, confidential computing is where data and IP get processed and the need to be protected and isolated from the platform and the infrastructure administrators.
•Why customers are worried about security as they move their workloads to the Cloud and how confidential computing can help address these concerns.
•The three stages of data protection: at rest, in transit, and data protection in use. Most customers want an independent entity to verify the trusted execution environment to ensure it is trustworthy. That trust authority is what we call Project Amber.
Read more about Advancing Confidential Computing with Intel’s Project Amber from Nikhil Deshpande and Raghu Yeluri here: https://buff.ly/3w0Bi8X
Check it out. For more information, previous podcasts, and full versions, visit our website at https://cybersecurityinside.com
#confidentialcomputing #projectamber #IntelVision
If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms.
Apple Podcast: https://podcasts.apple.com/us/podcast/cyber-security-inside-podcast/id1526572021
Spotify: https://open.spotify.com/show/6RN4ATo5ZDGvgaEj8rLep7?si=EQyu5_A0RvaEDGMdmiiRug
Follow our hosts Tom Garrison and Camille Morhardt: Tom: @tommgarrison Camille: @morhardt
Learn more about Intel Cybersecurity: https://www.intel.com/content/www/us/en/security/overview.html
Intel Compute Life Cycle (CLA): https://www.intel.com/content/www/us/en/security/compute-lifecycle-assurance.html
Subscribe now to Intel Technology on YouTube: https://intel.ly/3P9BA7x
About Intel Technology:
Intel has always been at the forefront of developing exciting new technology for business and consumers including emerging technologies, data center servers, business transformation, memory and storage, security, and graphics. The Intel Technology YouTube channel is a place to learn tips and tricks, get the latest news, and watch product demos from both Intel and our many partners across multiple fields.
Connect with Intel Technology:
Visit Intel Technologies WEBSITE: https://intel.ly/IntelTechnologies
Follow Intel Technology on TWITTER: https://twitter.com/IntelTech
See also Intel Optimization Notice: https://intel.ly/2HVXVo5
Increasing Trust in Confidential Computing with Project Amber | Intel Technology
https://www.youtube.com/inteltechnology
In this episode of Cyber Security Inside Live from The Green Room, Camille talks with Raghu Yeluri, Intel Senior Principal Engineer and Lead Security Architect from Intel’s Vision Conference in Texas.
You’ll learn:
•A high-level definition of Project Amber and overview of what confidential computing is.
•At the core, confidential computing is where data and IP get processed and the need to be protected and isolated from the platform and the infrastructure administrators.
•Why customers are worried about security as they move their workloads to the Cloud and how confidential computing can help address these concerns.
•The three stages of data protection: at rest, in transit, and data protection in use. Most customers want an independent entity to verify the trusted execution environment to ensure it is trustworthy. That trust authority is what we call Project Amber.
Read more about Advancing Confidential Computing with Intel’s Project Amber from Nikhil Deshpande and Raghu Yeluri here: https://buff.ly/3w0Bi8X
Check it out. For more information, previous podcasts, and full versions, visit our website at https://cybersecurityinside.com
#confidentialcomputing #projectamber #IntelVision
If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms.
Apple Podcast: https://podcasts.apple.com/us/podcast/cyber-security-inside-podcast/id1526572021
Spotify: https://open.spotify.com/show/6RN4ATo5ZDGvgaEj8rLep7?si=EQyu5_A0RvaEDGMdmiiRug
Follow our hosts Tom Garrison and Camille Morhardt: Tom: @tommgarrison Camille: @morhardt
Learn more about Intel Cybersecurity: https://www.intel.com/content/www/us/en/security/overview.html
Intel Compute Life Cycle (CLA): https://www.intel.com/content/www/us/en/security/compute-lifecycle-assurance.html
Subscribe now to Intel Technology on YouTube: https://intel.ly/3P9BA7x
About Intel Technology:
Intel has always been at the forefront of developing exciting new technology for business and consumers including emerging technologies, data center servers, business transformation, memory and storage, security, and graphics. The Intel Technology YouTube channel is a place to learn tips and tricks, get the latest news, and watch product demos from both Intel and our many partners across multiple fields.
Connect with Intel Technology:
Visit Intel Technologies WEBSITE: https://intel.ly/IntelTechnologies
Follow Intel Technology on TWITTER: https://twitter.com/IntelTech
See also Intel Optimization Notice: https://intel.ly/2HVXVo5
Increasing Trust in Confidential Computing with Project Amber | Intel Technology
https://www.youtube.com/inteltechnology
Be the first to comment



