eweekchat

Confidential Computing
JOIN US: This is a chat-based conversation about how a newly recognized trend in IT security that follows data all the way through the transom and protects it at every stage--including when it's processing. Join us!
   5 years ago
#eweekchatNext-Gen Cloud ServicesJOIN US: This is a chat-based conversation about new types of cloud (and cloud delivery) services, which are becoming more pervasive and diversified than ever. We are becoming more dependent on the cloud each day--especially during the COVID-19 pandemic. Join us!
   5 years ago
#eweekchatLegacy Company InnovationJOIN US: This is a chat-based conversation about how companies that have become standard providers are--or are not--continuing to be creative. New competitors are entering the markets all the time, so the pressure is on. Join us!
Chris Preimesberger
Q1: What are the key facets of confidential computing that separate it from conventional security?
Bruce Kornfeld
Typically, "conventional" security typically address protection against threats before they make it into a system and/or protecting data at rest. Confidential Computing is all about protecting data while it is being processed inside a computer. So its another layer
Chris Preimesberger
@brucekornfeld So Bruce, does this mean CC has to be embedded inside chips?
Bruce Kornfeld
Kinda of. It doesn't have to be completed embedded inside chips. But there is a hardware (chip level) component to CC. This is where the extra security and processing power comes from.
Bruce Kornfeld
Two examples of chip level options would be TPM and SGX.
Pete Jarvis
Confidential computing entails Security, Encryption, Auditing, and Verification of use of the data for me. You have to be able to control access, be able to see what is being accessed, and verify by whom.

(edited)

Pete Jarvis
A key aspect of this is technologies such as homomorphic encryption.
Pete Jarvis
@TechnoPhobe01Worth reading: https://en.wikipedia.org/wiki/Homomorphic_encrypti...
https://en.wikipedia.org/wiki/Homomorphic_encryption
Homomorphic encryption - Wikipedia
Homomorphic encryption - Wikipedia
Homomorphic encryption is a form of encryption allowing one to perform calculations on encrypted data without decrypting it first. The result of the computation is in an encrypted form, when decrypted the output is the same as if the operations had b...
Chris Preimesberger
@TechnoPhobe01 I'm thinking, Pete, that we wil be looking up this definition a lot more often as time goes by!
Dave Thaler
Homomorphic Encryption provides confidentiality at the place of computation, but does not guarantee the correct operation was done. Running HE inside an attested TEE, for example, can provide such an assurance.
Ameesh Divatia
First, CC is data-centric vs other perimeter or endpoint approaches. Second, it is protecting data end to end throughout its lifecycle enabling a 'failsafe' scenario.
Chris Preimesberger
Q1 coming right up ...
Chris Preimesberger
A little background: A new security consortium has been started up by corporations that include IBM, Intel, Microsoft, VMware (Dell Tech) and several others to develop next-gen security software/services that fit the "confidential computing" description. See link above!
Chris Preimesberger
Enough prep! Let's get to it ...
Chris Preimesberger
If you want some useful background to read while you're here, go here:
https://www.eweek.com/security/eweekchat-sept.-8-c...
https://www.eweek.com/security/eweekchat-sept.-8-confidential-computing-and-next-gen-security
#eWEEKchat Sept. 8: Confidential Computing and Next-Gen Security
#eWEEKchat Sept. 8: Confidential Computing and Next-Gen Security
#eWEEKchat PREVIEW: Join us Tuesday, Sept. 8 for our 90th monthly #eWEEKchat, because data security is everybody's concern. We can almost guarantee you'll learn something new that will enlighten you.
Chris Preimesberger
For those on Twitter only: To follow our discussion in real time, go here (http://www.crowdchat.net/eweekchat) ... You do have to authorize Twitter to join.
http://www.crowdchat.net/eweekchat
[LIVE CHAT] Promise, Potential of the Edge
[LIVE CHAT] Promise, Potential of the Edge
JOIN US: This is a chat-based conversation about how IT is rapidly evolving into a new phase that may turn out to be as important as, if not more important than, the cloud itself.
Chris Preimesberger
Please use this convention: To address Q1, please begin your answer with "A1," Q2/A2, and so on. In this manner, all the questions and answers can be kept in the same thread and found more easily later.
Pete Jarvis
Looking forward to the discussion :-)
Chris Preimesberger
I will ask some seed questions--about one every 8 to 10 minutes--and our guests can answer as they see fit. All of you following the conversation also may participate at any time. Let's stay on topic!
Chris Preimesberger
Could each of you introduce yourselves to our #eWEEKchat community? Thanks!
Glad you could all join us on this post-holiday weekend chat! We're back in the routine!
Rodrigue Hajjar
Hello, I'm Rod, Director of VPN @TunnelBear. Thank you for having us, glad to be here as `confidential computing` consumers.
Bruce Kornfeld
Hi all! Bruce Kornfeld here. I run product and marketing @stormagic - we're in the storage/HCI and security space. Looking forward to a lively chat.
Pete Jarvis
Hi I am Pete Jarvis from Polyverse, I am VP of Business. We are a security company, we won the top 100 CNBC startups in the world award. Looking forward to a great discussion.
Chris Preimesberger
Bruce, good to see you here again ... two #eWEEkchats in a row!
Chris Preimesberger
@TechnoPhobe01 Pete, thanks for joining us and good speaking with you the other day!
Chris Preimesberger
@rodrigue_ Rodrigue, welcome to our forum today! Thanks for making the time!
Bruce Kornfeld
Thanks for having me. These #eWEEKchat formats are fun and engaging.
Pete Jarvis
Always a pleasure to chat with you.