Join the Confidential Computing Summit 2025 (June 17-18, San Francisco Marriott Marquis) to explore confidential data and AI. Learn how to leverage generative AI while safeguarding sensitive information. Connect with innovators, researchers, and investor
Watch Now Confidential Computing Elevating Cloud Security and Privacy Mark Russinovich gives keynote at CC Summit “Confidential Computing: Elevating Cloud Security and Privacy”. Watch Now View All Videos Adopters Advancing Every Industry With Secure AI Cloud Service Providers Independent Software Vendor...
Aaron Fulkerson Jan 29, 2025 ISO 42001 Data and AI Compliance Plus, an extended call for Confidential Computing Summit speakers. Aaron Fulkerson Jan 15, 2025 New Year, New Momentum: Updates at Opaque Product breakthroughs, leadership milestones, and a look ahead at what’s coming in 2025. ...
4 min read Unlock what’s next: Microsoft at Red Hat Summit 2025 Best practices Apr 29 4 min read Adaptability by design: Unifying cloud and edge infrastructure trends Explore Azure AI Foundry The future of AI starts here. Envision your next great AI app with the latest technologies. Get st...
I had the opportunity to participate in this year's Open Confidential Computing Conference (OC3), hosted by our software partner, Edgeless Systems. The panel featured some of the industry's most respected technology leaders. Learn more.
VMs, it is natural to see the industry’s emphasis on highlighting the software components that the technology helps you eliminate from your VM’s trust boundary, such as the underlying hypervisor and host OS, because this highlights the innovative and transformative aspect of confidential computing...
Thanks for tuning in to theWindows Server Summiton demand! How can we ensure that - UEFI updates - Reset of Secure Boot keys - changing mainboard in case of events (like BMC defect or mainboard defect) can be compensated? In these cases I could imagine that th...
Confidential computing changes the traditional trust relationship between applications and supervisors by removing the supervisor’s right to access the resources used by the application, while retaining the right to manage them. Removing that right of access is critical because the devices we u...
Azure confidential computing protects your data while it’s in use. It is the final piece to enable data protection through its lifecycle whether at rest, in transit, or in use. It is the cornerstone of our ‘Confidential Cloud’ vision, which aims to make data and code opaque to ...
InfoQ Dev Summit Boston (June 9-10, 2025): Actionable advice on critical development priorities from active, senior software developers. Register Now Facilitating the Spread of Knowledge and Innovation in Professional Software Development English edition Write for InfoQ Search Sign Up / Login ...