Artwork

Content provided by Lockstep Consulting Pty Ltd. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lockstep Consulting Pty Ltd or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

EP7: Confidential Computing: Protecting Data and Code in Use

37:47
 
Share
 

Manage episode 398895072 series 3479156
Content provided by Lockstep Consulting Pty Ltd. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lockstep Consulting Pty Ltd or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Data provides the basis for how we make decisions. An enemy of security these days, from our point of view, is plain text. We need better than that. We need device-assisted support for proving where data comes from and how it's been handled. We need systems that keep data (and code) from being altered without cause, that give us the ability to trace the change history of data.
Confidential computing is a new compute paradigm that provides a hardware-based foundation for running code and the data it manipulates. It safeguards data and code (it's all data; it's all code) in its most vulnerable state: while it's being processed.
In this episode of Making Data Better Steve and George are joined by Anjuna's Mark Bauer to dive into this new model's high impact on security and low impact on cloud app development.
Mark dissects the mechanics behind this approach including how it strengthens the software supply chain through hardware-based attestation. He addresses its fit in modern cloud infrastructure including Kubernetes, data loss prevention (DLP), API scanning and more.
The conversation addresses the initial major use cases for confidential computing. High risk environments including defense, banking, and healthcare are obvious. Not so obvious is securing multi-party data sets in the cloud for machine learning and AI-based applications.
So take a listen to this episode of Making Data Better and learn how hardware-based security can harden the cloud.

  continue reading

Chapters

1. EP7: Confidential Computing: Protecting Data and Code in Use (00:00:00)

2. Confidential Computing (00:00:22)

3. Confidential Computing and Verifying Software Trust (00:15:16)

4. Benefits and Applications of Confidential Computing (00:23:37)

16 episodes

Artwork
iconShare
 
Manage episode 398895072 series 3479156
Content provided by Lockstep Consulting Pty Ltd. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lockstep Consulting Pty Ltd or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Data provides the basis for how we make decisions. An enemy of security these days, from our point of view, is plain text. We need better than that. We need device-assisted support for proving where data comes from and how it's been handled. We need systems that keep data (and code) from being altered without cause, that give us the ability to trace the change history of data.
Confidential computing is a new compute paradigm that provides a hardware-based foundation for running code and the data it manipulates. It safeguards data and code (it's all data; it's all code) in its most vulnerable state: while it's being processed.
In this episode of Making Data Better Steve and George are joined by Anjuna's Mark Bauer to dive into this new model's high impact on security and low impact on cloud app development.
Mark dissects the mechanics behind this approach including how it strengthens the software supply chain through hardware-based attestation. He addresses its fit in modern cloud infrastructure including Kubernetes, data loss prevention (DLP), API scanning and more.
The conversation addresses the initial major use cases for confidential computing. High risk environments including defense, banking, and healthcare are obvious. Not so obvious is securing multi-party data sets in the cloud for machine learning and AI-based applications.
So take a listen to this episode of Making Data Better and learn how hardware-based security can harden the cloud.

  continue reading

Chapters

1. EP7: Confidential Computing: Protecting Data and Code in Use (00:00:00)

2. Confidential Computing (00:00:22)

3. Confidential Computing and Verifying Software Trust (00:15:16)

4. Benefits and Applications of Confidential Computing (00:23:37)

16 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play