THE LINUX FOUNDATION PROJECTS

Welcome to the March 2026 Newsletter

March2026

TL;DR — What’s in This Issue

  • Confidential Computing gained strong visibility this month through OC3, GTC, and KubeCon EU, reflecting a maturing ecosystem with more open discussion of technical, regulatory, and strategic challenges.
  • The TAC advanced key policy and technical work, including responses to NIST and UK government consultations and progress on guidance documents to help organizations adopt Confidential Computing more effectively.
  • Looking ahead, engagement opportunities continue to grow, including CCC resources for members and the upcoming CC Summit 2026, with session and panel proposals due April 8.

From the Executive Director 

Hello Community Member,

One of the big Confidential Computing conferences of the year happened this month: OC3 in Berlin (and virtual).  The CCC was a sponsor and had two sessions in a packed program – one on regulations and standards (which I presented in person) and one introducing the work of the consortium (which was presented remotely by Rachel Wang, vice chair of the Outreach Committee).  There were, however, multiple sessions by CCC members, including, of course, Edgeless Systems, who run the event.  A number of people have commented on how the industry and ecosystem seem to be maturing, but also on the honesty of many of the sessions.  This might seem to be an odd word to use, but as an industry becomes more established and sure of itself and its future, it makes sense that we can discuss challenges that we face – regulatory, technical, tactical and strategic – in the knowledge that these are not existential threats, but issues that can be openly explored and don’t need to be hidden.

One of the most important parts of the CCC’s mission is allowing organizations and experts from across the industry and ecosystem to work together to resolve these sorts of challenges.  As a part of the Linux Foundation, and with our anti-trust policy firmly in place since our foundation, our committees and special interest groups (SIGs) offer a safe place to discuss and work on tricky issues.  We also strive to provide a safe and welcoming set of spaces for all types of discussion.  While members may not always agree with each other (it would probably be more worrying if they did!), we attempt to navigate the various viewpoints that come up and, where we need to express an opinion or publish materials, to work towards a consensus.  Please join one of our meetings to find out more – or catch up with previous meetings by watching them on our YouTube channel.

Outreach

As Mike mentioned above, this month marked an exciting time for Confidential Computing awareness! 

OC3 brought together the Confidential Computing community in Berlin for 27 talks spanning hardware, cloud platforms, attestation, and AI. Our event recap highlights key themes, insights, and takeaways from the conversations shaping the future of confidential computing. Read the recap.

At GTC, the CEO of NVIDIA highlighted the “incredible importance” of Confidential Computing in his keynote and shared how security across the whole stack was required to drive AI and data sovereignty advancements. Intel and others also showcased real world examples of Confidential Computing on the show floor and across multiple co-hosted sessions that featured thought leaders from Google, NVIDIA, Opaque and the Technology Innovation Institute (TII). The GTC Shift that Put Confidential AI at the Center of Everything podcast by Opaque highlighted the news around CC and how it is securely advancing AI around the world.

At KubeCon EU, we saw a new announcement from Red Hat and NVIDIA around the Cloud Native Computing Foundation’s (CNCF) Confidential Containers community, in addition to a tech preview for the GPU on OpenShift.

And a reminder that CC Summit 2026, which is coming June 23-24 to SF, has opened their Call for Proposals HERE. The deadline is April 8th to get the Session Presentation (25 Minutes Including Q&A) and Panel Discussion (25 Minutes Including Q&A) proposals submitted. Notifications of acceptance will be shared on May 4th.

Outreach Resources: 

From the TAC

The TAC has had a productive March focusing on industry-level guidance and regulatory engagement. We successfully finalized and submitted our response to the NIST RFI regarding AI safety and security standards. Furthermore, we concluded our response to the UK Government’s Call for Evidence on AI and data privacy, emphasizing the critical role of Confidential Computing in securing sensitive workloads across international borders. These efforts ensure the Consortium’s technical perspective is represented in the frameworks that will govern the next generation of computing infrastructure.

Internal workstreams have made substantial progress on our suite of technical guidance documents. We are nearing completion on two of the three documents we outlined last month. This month also saw the launch of a fourth technical document focused on integration levels. This new workstream aims to clarify the role of integration in realizing the benefits of Confidential Computing – helping organizations navigate the technical trade-offs between security depth and operational ease.

These documents directly address the implementation challenges identified in recent market research, particularly the need for standardized paths to bridge the industry-wide skills gap. As the market moves beyond early pilots, providing these clear, architecturally agnostic roadmaps is the TAC’s primary focus. We invite all technical representatives from our member companies (and unaffiliated experts) to join these weekly sessions to ensure our guidance reflects the full breadth of the current landscape.

Recent News

  • OC3 Recap
    • At OC3 2026, the global Confidential Computing community gathered in Berlin and online to discuss how the ecosystem is advancing secure computing for AI, cloud infrastructure, and protecting sensitive data in use. Our event recap highlights key themes, insights, and takeaways from the conversations shaping the future of confidential computing. Read the recap.

Let’s grow our community!  Share this with your network.

Subscribe to CCC Newsletter

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.