Blogs

Deploying Secure Confidential Containers

Deploying Confidential Containers have become the scalable, flexible application deployment feels Bahaa Al Zubaidi. While encryption protects the data at rest and in transit, the data in use is vulnerable since its actively being processed while the applications are running. […]

Read More
Use Cases of Confidential Computing

In an age where data is often called the new oil, securing sensitive information through its entire lifecycle has become a top priority observed Bahaa Al Zubaidi. Many organizations have adopted data-at-rest and data-in-transit encryption, however, securing data in use […]

Read More
Running Secure DevOps with Kubernetes

Corresponding with the evolution of DevOps within cloud-native ecosystems, the emphasis on security at all levels of the software life cycle is greater than ever stated Bahaa Al Zubaidi. Standard approaches to securing infrastructure and code and their deployments are […]

Read More
Protecting Data with Computing

Bahaa Al Zubaidi said that data encryption of ‘data at rest’, as has been very common practice, and ‘data in transit’, while perhaps not as widely used still is something most organizations know is a best practice. What is often […]

Read More
AI Models with Confidential Computing

When it comes to AI, accuracy and reliability are only ever equal to the security and privacy of the data it uses stated Bahaa Al Zubaidi. So far, AI pipelines are typically kept running in some corner, in the cloud. […]

Read More
Confidential Computing Encryption

Bahaa Al Zubaidi feels that Confidential Computing protects data-at-rest and data-in-motion, making sure that information housed within databases and zipping across your network lines stays off-limits to intruders. As companies turn increasingly to operations “in the cloud” with real-time data […]

Read More
div.container.bglight