JOIN US: This is a chat-based conversation about how a newly recognized trend in IT security that follows data all the way through the transom and protects it at every stage--including when it's processing. Join us!
Final Thoughts: CC is another example of how the security industry is still in its infancy even though we've been going at it for years, trying to protect organizations information. CC was birthed thanks to hardware/chip developers and now its time for sw to bring it home!
This has been a great and informative discussion. Outstanding interaction and engagement. Want to thank each of you who brought a perspective, opinion or data point to our community round table today. We've averaged about two tweets per minute!
A5: The need to process data without revealing it has never been more relevant in this era of massive data generation, sophisticated analytics techniques and stringent privacy regulations. CC is a promising initiative to accomplish this goal.
FYI: Today's discussion will continue to be accessible on this website for another three weeks, or until the next #eWEEKchat is set up; thereafter it will be archived for a year or so at CrowdChat.net.
http://CrowdChat.net
CrowdChat
CrowdChat CrowdChat is one stop solution to host #hashtag chats across multiple social networks. It is more than just Tweet Chat. A beautiful card like this, is automatically appended to updates posted on Twitter. It comes packed with FREE analytics for early ...
A5 The next big step is making it easy to convert existing apps to run in #confidentialcomputing environments in public cloud rather than rewriting apps. Also, have availability of infrastructure across all the public cloud providers in different regions will be a big boost to CC
A5: The hyperscale cloud providers have all either announced or gone GA with #confidentialcomputing infrastructure this year. The chip manufacturers also have made major announcement/progress in CC hardware. So, the answer is yes.
A5: Completely agree, Chris. CC is coming, big time! The hardware (chip sets) are there, high performance, low cost, etc...Now the security software industry is getting ready to unveil lots of ways to leverage this infrastructure to better protect customer's information.
A5: Cloud providers are making it easy to spin up new confidential compute instances. Popular tools are already being worked on to take advantage of running on TEE.
A5: I do hope to see a world where "confidential computing" is enabled by default at every cloud provider. From the performance benchmarks we're seeing from different providers, the drawbacks seem fairly limited.
A5: When we talk about our personal data, whether it’s messages sent to our loved ones, financial records, or health records, I expect my data to be handled securely. When using Face ID, Apple doesn't ask the user "do you want to use the Secure Enclave to protect your face map?"