Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Confidential Computing Membership Grows 60 Percent within Nine Months of Formation

The Confidential Computing Consortium, a Linux Foundation project and community dedicated to defining and accelerating the adoption of confidential computing, today announced Accenture, AMD, Anjuna, Anqlave, Cosmian, iExec, IoTeX, NVIDIA, and R3 have joined as members to contribute to the adoption of Confidential Computing.

“In the past five months, we’ve added ten new members including a preeminent consultancy, a leading semiconductor manufacturer, and a pioneer in graphics processing,” said Stephen Walli, Governing Board Chair. “This is a brilliant group of innovative companies that has come together to solve one of the key challenges in information security; protecting applications and data while in use.”

Recommended AI News: Flowmon Recognized In Gartner’s Market Guide For Network Detection And Response 2020

Today, data is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Additionally, the ability to protect data and code is limited in conventional computing infrastructure. Organizations that handle sensitive data such as Personally Identifiable Information (PII), financial data, or health information need to mitigate threats that target the confidentiality and integrity of the applications and data in system memory.

Related Posts
1 of 40,506

Confidential Computing protects data in use by performing computation in a hardware-based Trusted Execution Environment. These secure and isolated environments prevent unauthorized access or modification of applications and data while in use, thereby increasing the security assurances for organizations that manage sensitive and regulated data. It protects applications and data from breaches, malicious actors and insider threats, while providing the portability to move sensitive workloads between on-premises data centers, public cloud and the edge.

Recommended AI News: New Ericsson AIR Solutions To Accelerate 5G Mid-Band Deployment

While confidential computing can protect many types of applications and data, confidential computing technology provides a secure platform for multiple parties to combine, analyze and learn from sensitive data without exposing the data or machine learning algorithms to the other party. Often referred to as multi-party computing, federated learning or privacy-preserving analytics, confidential computing can unlock the power of sensitive data by enabling collaboration while preserving privacy and compliance.

Recommended AI News: Splashtop Expands EU Presence To Support Remote-Work Strategies In The Region

Comments are closed, but trackbacks and pingbacks are open.