Increasing Trust in Confidential Computing with Project Amber | Intel Technology

Your video will begin in 10
54 Views
Published
Customers are worried about security as they move their workloads to the Cloud and confidential computing can help address these concerns. Most customers want an independent entity to verify the trusted execution environment to ensure it is trustworthy for when data is in use. That trust authority is what we call Project Amber.

In this episode of Cyber Security Inside Live from The Green Room, Camille talks with Raghu Yeluri, Intel Senior Principal Engineer and Lead Security Architect from Intel’s Vision Conference in Texas.

You’ll learn:

•A high-level definition of Project Amber and overview of what confidential computing is.
•At the core, confidential computing is where data and IP get processed and the need to be protected and isolated from the platform and the infrastructure administrators.
•Why customers are worried about security as they move their workloads to the Cloud and how confidential computing can help address these concerns.
•The three stages of data protection: at rest, in transit, and data protection in use. Most customers want an independent entity to verify the trusted execution environment to ensure it is trustworthy. That trust authority is what we call Project Amber.

Read more about Advancing Confidential Computing with Intel’s Project Amber from Nikhil Deshpande and Raghu Yeluri here: https://buff.ly/3w0Bi8X

Check it out. For more information, previous podcasts, and full versions, visit our website at https://cybersecurityinside.com

#confidentialcomputing #projectamber #IntelVision

If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms.

Apple Podcast: https://podcasts.apple.com/us/podcast/cyber-security-inside-podcast/id1526572021

Spotify: https://open.spotify.com/show/6RN4ATo5ZDGvgaEj8rLep7?si=EQyu5_A0RvaEDGMdmiiRug

Follow our hosts Tom Garrison and Camille Morhardt: Tom: @tommgarrison Camille: @morhardt

Learn more about Intel Cybersecurity: https://www.intel.com/content/www/us/en/security/overview.html

Intel Compute Life Cycle (CLA): https://www.intel.com/content/www/us/en/security/compute-lifecycle-assurance.html

Subscribe now to Intel Technology on YouTube: https://intel.ly/3P9BA7x

About Intel Technology:
Intel has always been at the forefront of developing exciting new technology for business and consumers including emerging technologies, data center servers, business transformation, memory and storage, security, and graphics. The Intel Technology YouTube channel is a place to learn tips and tricks, get the latest news, and watch product demos from both Intel and our many partners across multiple fields.

Connect with Intel Technology:
Visit Intel Technologies WEBSITE: https://intel.ly/IntelTechnologies
Follow Intel Technology on TWITTER: https://twitter.com/IntelTech

See also Intel Optimization Notice: https://intel.ly/2HVXVo5

Increasing Trust in Confidential Computing with Project Amber | Intel Technology
https://www.youtube.com/inteltechnology
Category
Intel
Tags
increasing trust in confidential computing with project amber, confidential computing, project amber
Be the first to comment