Deploying Confidential Containers have become the scalable, flexible application deployment feels Bahaa Al Zubaidi. While encryption protects the data at rest and in transit, the data in use is vulnerable since its actively being processed while the applications are running. […]
Blogs
In an age where data is often called the new oil, securing sensitive information through its entire lifecycle has become a top priority observed Bahaa Al Zubaidi. Many organizations have adopted data-at-rest and data-in-transit encryption, however, securing data in use […]
Corresponding with the evolution of DevOps within cloud-native ecosystems, the emphasis on security at all levels of the software life cycle is greater than ever stated Bahaa Al Zubaidi. Standard approaches to securing infrastructure and code and their deployments are […]
Bahaa Al Zubaidi said that data encryption of ‘data at rest’, as has been very common practice, and ‘data in transit’, while perhaps not as widely used still is something most organizations know is a best practice. What is often […]
When it comes to AI, accuracy and reliability are only ever equal to the security and privacy of the data it uses stated Bahaa Al Zubaidi. So far, AI pipelines are typically kept running in some corner, in the cloud. […]
Bahaa Al Zubaidi feels that Confidential Computing protects data-at-rest and data-in-motion, making sure that information housed within databases and zipping across your network lines stays off-limits to intruders. As companies turn increasingly to operations “in the cloud” with real-time data […]