JOIN US: This is a chat-based conversation about how a newly recognized trend in IT security that follows data all the way through the transom and protects it at every stage--including when it's processing. Join us!
Thanks so much, Bruce. It IS my day today, and I am off work, but wouldn't miss one of these if at all possible. I'm on PTO in Carmel, Calif., so hard to beat the location!
Final Thoughts: CC is another example of how the security industry is still in its infancy even though we've been going at it for years, trying to protect organizations information. CC was birthed thanks to hardware/chip developers and now its time for sw to bring it home!
This has been a great and informative discussion. Outstanding interaction and engagement. Want to thank each of you who brought a perspective, opinion or data point to our community round table today. We've averaged about two tweets per minute!
A5: The need to process data without revealing it has never been more relevant in this era of massive data generation, sophisticated analytics techniques and stringent privacy regulations. CC is a promising initiative to accomplish this goal.
FYI: Today's discussion will continue to be accessible on this website for another three weeks, or until the next #eWEEKchat is set up; thereafter it will be archived for a year or so at CrowdChat.net.
http://CrowdChat.net
CrowdChat
CrowdChat CrowdChat is one stop solution to host #hashtag chats across multiple social networks. It is more than just Tweet Chat. A beautiful card like this, is automatically appended to updates posted on Twitter. It comes packed with FREE analytics for early ...
A5 The next big step is making it easy to convert existing apps to run in #confidentialcomputing environments in public cloud rather than rewriting apps. Also, have availability of infrastructure across all the public cloud providers in different regions will be a big boost to CC