Bahaa Al Zubaidi feels that Confidential Computing protects data-at-rest and data-in-motion, making sure that information housed within databases and zipping across your network lines stays off-limits to intruders. As companies turn increasingly to operations “in the cloud” with real-time data […]
Blogs
The risk of data breaches and unauthorized access is growing at a staggering rate stated Bahaa Al Zubaidi. Companies are adopting advanced encryption, access control, and identity management, but there’s still one area that is frighteningly exposed—data in transit. This […]
The advancement of the Cloud continues, changing how we manage infrastructure, deploy applications and get insights from data observed Bahaa Al Zubaidi. However, enterprises are still moving their heavier processing tasks into a multi-tenant cloud environment, which makes concerns about […]
Traditional encryption methods do a great job of protecting data at rest and in transit, but they’re ineffective at protecting data while it’s being processed stated Bahaa Al Zubaidi. Known as “data in use “, this critical stage represents the […]
Bahaa Al Zubaidi said that with the internet now extended beyond the flat screens of desktops or devices that are mobile, a new area has opened up for designers: creating consumer experiences in 3D environments that are total immersion and […]
Bahaa Al Zubaidi asked, “Imagine an internet that you not only observe through a display or printout software but also physically enter into, move through, and have sensory experiences in.” Imagine yourself in a 3D world made of data. To […]