Increasing Trust in Confidential Computing with Project Amber | Intel Business

52 Views
Published
Customers are worried about security as they move their workloads to the Cloud and confidential computing can help address these concerns. Most customers want an independent entity to verify the trusted execution environment to ensure it is trustworthy for when data is in use. That trust authority is what we call Project Amber.

In this episode of Cyber Security Inside Live from The Green Room, Camille talks with Raghu Yeluri, Intel Senior Principal Engineer and Lead Security Architect from Intel’s Vision Conference in Texas.

You’ll learn:

•A high-level definition of Project Amber and overview of what confidential computing is.
•At the core, confidential computing is where data and IP get processed and the need to be protected and isolated from the platform and the infrastructure administrators.
•Why customers are worried about security as they move their workloads to the Cloud and how confidential computing can help address these concerns.
•The three stages of data protection: at rest, in transit, and data protection in use. Most customers want an independent entity to verify the trusted execution environment to ensure it is trustworthy. That trust authority is what we call Project Amber.

Read more about Advancing Confidential Computing with Intel’s Project Amber from Nikhil Deshpande and Raghu Yeluri here: https://buff.ly/3w0Bi8X

Check it out. For more information, previous podcasts, and full versions, visit our website at https://cybersecurityinside.com

#confidentialcomputing #projectamber #IntelVision

If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms.

Apple Podcast: https://podcasts.apple.com/us/podcast/cyber-security-inside-podcast/id1526572021

Spotify: https://open.spotify.com/show/6RN4ATo5ZDGvgaEj8rLep7?si=EQyu5_A0RvaEDGMdmiiRug

Follow our hosts Tom Garrison and Camille Morhardt: Tom: @tommgarrison Camille: @morhardt

Learn more about Intel Cybersecurity: https://www.intel.com/content/www/us/en/security/overview.html

Intel Compute Life Cycle (CLA): https://www.intel.com/content/www/us/en/security/compute-lifecycle-assurance.html

Subscribe now to Intel Business on YouTube: https://intel.ly/43XZh6J

About Intel Business:
Get all the IT info you need, right here. From data centers to devices, the Intel® Business Center has the resources, guidance, and expert insights you need to get your IT projects done right.

Connect with Intel Business:
Visit Intel Business's WEBSITE: http://intel.ly/itcenter
Follow Intel Business on TWITTER: https://twitter.com/IntelBusiness
Follow Intel Business on LINKEDIN: https://linkedin.com/showcase/intel-business
Follow Intel Business on FACEBOOK: https://www.facebook.com/IntelBusiness

Increasing Trust in Confidential Computing with Project Amber | Intel Business
https://www.youtube.com/intelbusiness
Category
Intel
Tags
increasing trust in confidential computing with project amber, customers, cloud
Be the first to comment