As cyber threats develop extra refined and information privateness rules develop sharper enamel, chief CIOs are beneath growing stress to safe enterprise information at each stage – at relaxation, in movement, and now, more and more, in use.
Confidential computing, a know-how that protects information whereas it’s being processed, is turning into an integral part of enterprise safety methods. Whereas the promise is obvious, the trail to implementation is complicated and calls for strategic coordination throughout enterprise, IT, and compliance groups.
Itai Schwartz, co-founder and CTO at Thoughts, explains that confidential computing allows safe information processing even in decentralized environments, which is especially essential for AI workloads and collaborative functions.
“Distant attestation capabilities additional assist a zero-trust strategy by permitting techniques to confirm the integrity of workloads earlier than granting entry,” he says through e mail.
Keep reading this article in InformationWeek, a DCN partner site
