When it comes to AI, accuracy and reliability are only ever equal to the security and privacy of the data it uses stated Bahaa Al Zubaidi. So far, AI pipelines are typically kept running in some corner, in the cloud. […]
Blogs
Bahaa Al Zubaidi feels that Confidential Computing protects data-at-rest and data-in-motion, making sure that information housed within databases and zipping across your network lines stays off-limits to intruders. As companies turn increasingly to operations “in the cloud” with real-time data […]
The risk of data breaches and unauthorized access is growing at a staggering rate stated Bahaa Al Zubaidi. Companies are adopting advanced encryption, access control, and identity management, but there’s still one area that is frighteningly exposed—data in transit. This […]
The advancement of the Cloud continues, changing how we manage infrastructure, deploy applications and get insights from data observed Bahaa Al Zubaidi. However, enterprises are still moving their heavier processing tasks into a multi-tenant cloud environment, which makes concerns about […]
Traditional encryption methods do a great job of protecting data at rest and in transit, but they’re ineffective at protecting data while it’s being processed stated Bahaa Al Zubaidi. Known as “data in use “, this critical stage represents the […]
Bahaa Al Zubaidi said that with the internet now extended beyond the flat screens of desktops or devices that are mobile, a new area has opened up for designers: creating consumer experiences in 3D environments that are total immersion and […]