Our latest blogs
Performing Trusted Secure Analytics

Bahaa Abdul Hadi feels that secure analytics powered by trusted enclaves enable businesses to extract value from sensitive datasets, like medical records, financial transactions or proprietary IP-everyone now can collaborate while never exposing the raw data to anyone (not even […]

Read More
Deploying Secure Confidential Containers

Deploying Confidential Containers have become the scalable, flexible application deployment feels Bahaa Al Zubaidi. While encryption protects the data at rest and in transit, the data in use is vulnerable since its actively being processed while the applications are running. […]

Read More
Use Cases of Confidential Computing

In an age where data is often called the new oil, securing sensitive information through its entire lifecycle has become a top priority observed Bahaa Al Zubaidi. Many organizations have adopted data-at-rest and data-in-transit encryption, however, securing data in use […]

Read More
Running Secure DevOps with Kubernetes

Corresponding with the evolution of DevOps within cloud-native ecosystems, the emphasis on security at all levels of the software life cycle is greater than ever stated Bahaa Al Zubaidi. Standard approaches to securing infrastructure and code and their deployments are […]

Read More
div.container.bglight