THE LINUX FOUNDATION PROJECTS
All Posts By

Confidential Computing Consortium

New Study Finds Confidential Computing Emerging as a Strategic Imperative for Secure AI and Data Collaboration

By Announcement, Blog No Comments

Research commissioned by the Confidential Computing Consortium highlights accelerating adoption driven by AI innovation, compliance standards, and data sovereignty

Summary

  • The Confidential Computing Consortium (CCC), a project community at the Linux Foundation, announced new IDC research, “Unlocking the Future of Data Security: Confidential Computing as a Strategic Imperative.”
  • The global survey of 600+ IT leaders across 15 industries finds that 75% of organizations are adopting Confidential Computing, signaling its shift from niche to mainstream.
  • By adding protection of data in-use, Confidential Computing is emerging as a core enabler of secure, data-centric innovation, delivering measurable gains in data integrity, confidentiality and compliance.
  • Despite strong momentum, skills gaps, validation challenges and interoperability barriers persist, highlighting the need for open standards and industry collaboration led by the CCC.

SAN FRANCISCO, Dec 3, 2025 – The Confidential Computing Consortium (CCC), a project community at the Linux Foundation dedicated to defining and accelerating the adoption of Confidential Computing, today announced findings from a new survey conducted by IDC. Based on insights from more than 600 global IT leaders across 15 industries, the study, “Unlocking the Future of Data Security: Confidential Computing as a Strategic Imperative,” reveals that Confidential Computing has become a foundational enabler of modern data-centric innovation, but implementation complexities are hindering widespread adoption.

“Confidential Computing has grown from a niche concept into a vital strategy for data security and trusted AI innovation,” said Nelly Porter, governing board chair, Confidential Computing Consortium. “As international security and compliance regulations tighten, organizations must invest in education and interoperability to meet heightened data confidentiality, integrity and availability standards – and enable secure AI adoption across sensitive environments.”

Major benefits push Confidential Computing into the mainstream

Awareness and adoption of Confidential Computing continue to grow, expanding its footprint into more industries and applications. According to IDC, “this momentum reflects a broader shift toward securing data in use, driven by the need to mitigate urgent threats and enable secure collaboration in environments where sensitive data is routinely handled.” The study finds:

  • 75% of organizations are adopting Confidential Computing; 57% have started piloting/testing, joining the 18% of organizations already in production
  • 88% of respondents report improved data integrity as the primary benefit of Confidential Computing, followed by confidentiality with proven technical assurances (73%) and better regulatory compliance (68%)
  • Confidential Computing enables top business outcomes, including accelerated innovation, enhanced regulatory compliance, increased cost efficiency and more. Confidential Computing combined with AI-driven analytics accelerates innovation by enabling secure model training, inference and AI agents on sensitive data.
  • Confidential Computing stands out as a practical and scalable alternative especially when compared with more complex or resource-intensive methods. It is also applicable for standard computing workloads, without requiring rewriting of applications or algorithms. 

Adoption drivers shift gears

As security, compliance, and innovation imperatives converge, Confidential Computing adoption is being fueled as a response to external regulations and an enabler for internal business transformation goals. The study finds:

  • Regulatory frameworks like the Digital Operational Resilience Act (DORA) are driving adoption as 77% of organizations are more likely to consider Confidential Computing due to DORA’s specific requirement to protect data in-use.
  • Workload security/external threats (56%), Personally Identifiable Information (PII) protection (51%), and compliance (50%) are the top drivers for adoption, but new use cases – especially in AI and cloud – are expanding relevance, with organizations leveraging Confidential Computing to train AI models, run inference, and deploy AI agents on regulated datasets without compromising privacy
  • Public cloud users are the most likely to implement Confidential Computing technology (71%), followed by hybrid/distributed cloud users (45%), with the acceleration in these environments, driven by the need for scalable security and compliance with evolving regulatory requirements.

Geographic and industry differences highlight early leaders and emerging priorities in Confidential Computing

  • Canada and the United States reported the highest percent of Confidential Computing services in full production, at 26% and 24%, respectively, followed by China and the United Kingdom, both at 20%
  • Greater protection from outside attackers is the highest priority use case in the United States and Britain, whereas Canada, France, Germany and China prioritized protection of personally identifiable information, reflecting more stringent privacy regulations
  • The financial services industry has the highest number percent of full production deployments (37%), followed by healthcare (29%) and government (21%)
  • Healthcare respondents place a significantly higher priority on privacy-preserving data collaborations with multiple parties (78%) than financial services (61%) or government (26%), reflecting medical’s need to safeguard highly regulated data, and enable AI-powered diagnostics through privacy-preserving collaborations.

Addressing barriers and accelerating readiness

Despite strong momentum, the IDC study identifies several adoption challenges, including attestation validation (84%), misconception of Confidential Computing as niche technology (77%), and a skills gap (75%), which must be addressed through industry collaboration, education and standardization. 

To address these challenges and realize the full benefits of Confidential Computing, IDC recommends that organizations: 

  • Start with pilot initiatives to demonstrate measurable value
  • Adopt open standards and vendor-agnostic frameworks 
  • Invest in third-party attestation and interoperability testing 
  • Engage in industry-led initiatives such as those led by the CCC to align on technical assurance and trust frameworks

The next era of Confidential Computing unlocks new possibilities in identity, AI, multi-party collaboration and privacy-preserving analytics that were previously out of reach. For more information, read the full white paper here.

About Confidential Computing Consortium

The Confidential Computing Consortium (CCC) is a community focused on projects securing data in use and accelerating the adoption of Confidential Computing through open collaboration. CCC brings together hardware vendors, cloud providers, and software developers to accelerate the adoption of Trusted Execution Environment (TEE) technologies and standards. Learn more at www.confidentialcomputing.io

Welcome to the November 2025 Newsletter

By Newsletter No Comments

In Today’s Issue

  1. From the Executive Director
  2. Outreach
  3. From the TAC
  4. Recent News

This month’s issue highlights several significant year-end milestones across the Consortium — from finalizing the 2026 budget to electing our next slate of Governing Board, TAC, and Outreach committee officers. November is always a pivotal planning period, and this year brings meaningful progress on strategic direction, resource allocation, and community-facing initiatives. We’re also closing out major projects, including our IDC research study, while preparing for a strong and globally connected 2026.

From the Executive Director 

November brings two important sets of decisions for the Consortium each year: what our budget should look like and who should serve as officers of the Governing Board and our committees. 

Over the past couple of years, the GB made the decision to run down our surplus (accrued mainly due to reduced activities during the Covid era), but this course of action is of course unsustainable and was always planned as a short-term measure. The Board has therefore spent much time over the past two months considering the various options available to the Consortium, supported with options (and many, many numbers!) from the supporting staff of the Linux Foundation, who, as ever, have been extraordinarily helpful.

By the time this newsletter reaches you, the final shape of the budget for 2026 should be complete and agreed, leaving us in a secure financial position not just for next year, but for the coming years after that.

Alongside the budget discussions, we’ve been running votes for the Chair and Vice-Chair positions of the Governing Board, TAC and Outreach committees.  I’d like to welcome the following folks:

  • Governing Board Chair: Nelly Porter (Google) – returning
  • Governing Board Vice-Chair: Michael O’Connor (Nvidia)
  • Governing Board General Member Representatives:
    • Jens Albers (Fr0ntierX)
    • Samuel Ortiz (Rivos Inc) – returning
    • Manu Fontaine (Hushmesh) – returning
  • TAC Chair: Dan Middleton (Nvidia) – returning
  • TAC Vice-Chair: Ijlal Loutfi (Canonical)
  • Outreach Chair: Laura Martinez (Nvidia)

We will hold an election for Outreach Vice-Chair to fill this final position. I’d like to thank not only the returning officers, but also outgoing officers: Emily Fox, Mike Ferron-Jones and Yash Mankad for their hard work over the past twelve months.

Outreach

In November, the Outreach committee focused on finalizing our research project with IDC and determining our optimal strategy for 2026.  The IDC project titled, “Unlocking the Future of Data Security: Confidential Computing as a Strategic Imperative,” compiles results from 600 respondents in multiple countries.  It reveals growing awareness of Confidential Computing, tested the attractiveness of over a dozen usages, and showed impediments that need to be addressed to support wider adoption.  We are putting the finishing touches on it now, and plan to make it public in early December.

In 2026, Outreach plans to increase our global reach by optimizing event portfolio and  investing new resources in online content marketing and promotion. Our events strategy will be designed to maintain strong relationships with our ecosystem members, but also grow new adopters via events affiliated with security and privacy technologies, and fertile various industry segments.

From the TAC

We initiated the 2026 strategic direction, prioritizing the creation and dissemination of technical blueprints, best practices, and reference architectures, aligning with the Governing Board’s direction. A key theme arising from this is the immediate need for improved documentation and “how to get started” guides. Separately, the TAC received the annual review for the Islet project. Islet is unique in our portfolio in supporting mobile devices.

We also discussed recent publications assessing Confidential Computing. Our documents may not reflect the shared responsibility model, where the Cloud Service Provider remains part of the TCB for physical security. The TAC will look at revising existing documents or adding new ones to make this aspect more clear.

Finally we decided on 2026 allocations for two projects: Veraison (Program Management), SPDM (Security Audit). The Governing Board subsequently approved a smaller budget and so we may need to revisit our plans here.

Please join us at our last meeting of the year, December 11th, where we will hear from colleagues in the CNCF CoCo community talk about Trustee. This attestation project might become a key enabler to help adopters use the variety of attestation services emerging in the ecosystem.

Recent News

  • The Confidential Computing Consortium welcomes Confident Security as our newest Start-Up Member: Their work to make AI truly private, including OpenPCC, ohttp, bhttp, go-nvtrust, and more, directly supports our mission to advance open standards and adoption of Confidential Computing. Read the full announcement.
  • Microsoft Announces Preview of Newest Confidential VMs: This month at Ignite, Microsoft announced the latest addition to the Azure Confidential Computing portfolio with the preview of Azure Confidential VMs powered by Intel® TDX on 5th Gen Xeon processors.  These new Confidential VMs come equipped with AI acceleration built into the CPU with Intel® AMX technology.  For confidential storage and other workloads that need a balance of SSD capacity, compute, and memory, these new VMs can be provisioned with high-performance NVMe drives, achieving nearly 5X more throughput while reducing latency by about 16% compared to the previous SCSI generation. Overall, Microsoft reports lower IO latency by ~27 microseconds across block size and thread count. These Confidential VMs are also the first to use the open-source paravisor, OpenHCL. General availability is expected in select North American and European regions in Q1 2026.  Bosch, Thales, TDC Erhverv, and Arqit announced partnerships and endorsements as part of the reveal at Ignite. Read the full announcement.
  • CanaryBit Selected for Regulatory Sandbox with Ericsson and Volvo Group: CanaryBit, Ericsson and Volvo Group are collaborating to increase road safety, and the Swedish Authority for Privacy and Protection (IMY) is investigating the business use-case in a regulatory sandbox. CanaryBit Confidential Cloud suite enables secure, real-time vehicle-to-infrastructure data without compromising individual privacy. The sandbox project will examine whether Trusted Execution Environments (TEEs) can process road-infrastructure traffic data whilst preserving privacy. The outcome will refine regulations and accelerate privacy-first mobility innovations, a key step to unlocking the full potential of connected vehicles to create safer roads for everyone. This is a landmark moment, as it’s the first time a privacy authority has formally assessed TEEs as a Privacy Enhancing Technology.

Best regards,

The Confidential Computing Consortium

Let’s grow our community!  Share this with your network.

Welcoming Confident Security to the Confidential Computing Consortium

By Blog No Comments

The Confidential Computing Consortium (CCC) is pleased to welcome Confident Security as a new Start-Up Member.

Confident Security is dedicated to making AI truly private, developing technologies and practices that protect data and models in use without compromising performance or accessibility. The company’s mission closely aligns with the CCC’s goal of fostering open collaboration and standards to enable secure computation across industries.

Advancing Confidential AI Through Open Collaboration

By joining the CCC, Confident Security aims to help shape and accelerate the development of Confidential AI standards, ensuring privacy, integrity, and trust in next-generation machine learning systems. The company is particularly focused on frameworks that safeguard sensitive data used in AI training and inference while maintaining openness and interoperability.

In parallel, Confident Security has been expanding its open source contributions, sharing tools that support secure, privacy-preserving communication and computation. Recent releases include:

  • ohttp: privacy-preserving HTTP relay implementation
  • bhttp: binary HTTP protocol support
  • go-nvtrust: Go bindings for NVIDIA Trust extensions
  • twoway: bidirectional secure communication library

Most recently, Confident Security launched its largest open source project to date – OpenPCC, an open framework for privacy-preserving encryption and AI data security. This release was accompanied by an Axios feature and a comprehensive whitepaper outlining the architecture and technical foundations behind the project. OpenPCC represents a major milestone in the company’s vision to make secure, confidential computation accessible to all.

These projects demonstrate Confident Security’s commitment to advancing open, secure innovation and complement the CCC’s mission to drive adoption of confidential computing technologies.

Strengthening a Shared Mission

“It’s our mission to make AI truly private and part of making that happen are standards and education,” said a spokesperson from Confident Security. “For that reason, we’re very excited to join CCC and to contribute and collaborate with all the members to increase adoption and use of Confidential Computing technologies.”

As a recent addition to the CCC, Confident Security aligns itself with a global collective of technology pioneers, researchers, and innovators who are collaboratively striving to establish data protection and trusted execution as fundamental pillars for confidential computing. 

Welcome to the October 2025 Newsletter

By Newsletter No Comments

This month’s issue highlights key strategic developments within the CCC, including updates from the Executive Director on the Consortium’s evolving vision and upcoming 2026 priorities. You’ll also find coverage of recent outreach activities, from a successful workshop in San Francisco to our presence at the Open Source in Finance Forum in New York, along with the latest technical updates from the TAC. Finally, we share recent industry recognition from Gartner and welcome several new members advancing the mission to make Confidential Computing the foundation of secure and trusted computing worldwide.

From the Executive Director 

October has been busy for the CCC.  With two events (see below), new members, the creation of a research fund, new open source projects being considered for acceptance into the Consortium, the Governing Board has also been working to consider what the Consortium’s strategy for the next part of our lifecycle should look like, now that we’ve been around for six years.  We considered a variety of options, with the following goal just coming out in front:

“Transform the CCC into the acknowledged leader in creating and disseminating technical excellence for CC, promoting design best practice, use cases and reference architectures. Focus: best practice technical blueprints to service CC demand.”

Close behind was a vision to engage more closely with regulators and standards bodies and system integrators to build demand for CC, and the members of the GB also expressed a clear commitment to finding ways to increase engagement of all members in the work of the CCC, in alignment with the priorities of the individual members and their strategic prioririties. I expect the work of the Executive Director over the next year and beyond closely to reflect these aspirations.  In our November meeting, we plan to agree a budget for 2026 to support these goals, but in the meantime, please feel free to get in touch with me to discuss how you and your organization can make the most of these changes in how you work with and develop Confidential Computing opportunities.

Outreach

  • The Outreach Committee staged a successful customer workshop in San Francisco on October 20, featuring ten speakers and 30 attendees from industries ranging from pharmaceuticals to finance.  Engagement was very high as attendees explored a wide range of use cases and the benefits of several active Confidential Computing deployments.  The versatility, security, and compliance advantages of Confidential Computing were on full display, especially as the computing world ramps up AI.  See the full report on the CCC Blog here.
  • The CCC was one of the Lead Sponsors for this month’s Open Source in Finance Forum in New York, with a keynote (“How to Trust a Banker”) and a track dedicated to Confidential Computing on Wednesday, the second day.  Finance provides myriad use cases for Confidential Computing, and sessions in the track covered material ranging from a technical introduction to Confidential Computing to hands-on examples, use of CC to demonstrate compliance, and presentations from Google, Fr0ntierX, Super Protocol and Symphony.  Conversations in the “Hallway track” also revealed that many organizations are already trialling, testing and deploying Confidential Computing in a variety of situations, and how relevant our work is to various parts of the finance sector.

From the TAC

We are always looking for new ways to assist our open source projects. CCC projects already receive a number of [benefits]. As we budget for 2026 we are proposing to create a larger benefit for a couple of projects. We want to make a material amount of funding available to help solve one problem for a project. What that problem is will vary from project to project. For example, a 3rd party security audit, by definition cannot be conducted by the project’s own maintainers. In order to keep the amount significant we will only be able to support 2 projects in this way (versus spreading a smaller amount to all projects).

Another area of continuous improvement is our own efficiency on the TAC. We have traditionally met for 2 hour sessions fortnightly. This month we compressed the meeting down to 1 hour on the same fortnightly cadence. If you were used to joining us at 7am Pacific time on alternating Thursdays, you would now join us at 8am Pacific time. To keep the same velocity of work, we are shifting some prep work to the mail list and github issues. That way our scheduled time together will be more productive.

Recent News

  • Gartner identifies Confidential Computing as one of the top strategy technology trends for 2026. By 2029, Gartner predicts more than 75% of operations processed in untrusted infrastructure will be secured in-use by confidential computing. Read the article.

New Member Announcement

  • We’re pleased to welcome Acompany Co., Ltd. as the newest General Member of the Confidential Computing Consortium. By joining the CCC, Acompany reinforces our shared goal: to make Confidential Computing the default for secure data processing and trusted AI just as HTTPS became the default for the web. Read the announcement.
  • We’re pleased to welcome FuriosaAI as Confidential Computing Consortium’s newest startup member! By joining CCC, FuriosaAI hopes to contribute its expertise in hardware-accelerated inference while learning from the community’s efforts to standardize and advance confidential computing practices. Read the announcement.
  • We are excited to welcome Phala Network as the newest General Member of the Confidential Computing Consortium! Phala is a secure cloud platform enabling developers to run AI workloads inside hardware-protected Trusted Execution Environments (TEEs). They are also contributing directly to CCC-hosted projects, with their open-source project, dstack, now part of the Linux Foundation under the CCC. Read the announcement

Best regards,

The Confidential Computing Consortium

Let’s grow our community!  Share this with your network.
Subscribe to CCC Newsletter

Welcome Acompany to the Confidential Computing Consortium

By Blog No Comments

We’re pleased to welcome Acompany as the newest General Member of the Confidential Computing Consortium (CCC)!

Acompany provides Confidential Computing as a strategic security foundation, powering secure data collaboration and advancing trusted AI. Its technology supports use cases ranging from data clean rooms for a Fortune Global 500 telecom company (KDDI) to optimized manufacturing processes and mission-critical national security initiatives.

Expanding the Global Market for Confidential Computing

Acompany joins the Consortium with a clear vision: to accelerate the global adoption of Confidential Computing through community collaboration and open innovation.

“At Acompany, our mission is ‘Trust. Data. AI.’ We are delighted to join the Confidential Computing Consortium and work with industry leaders to advance secure and trusted AI. Just as HTTPS became the default for the web, Confidential Computing will become the default for AI—and we are proud to help shape that future.”  — Ryosuke Takahashi, CEO, Acompany Co., Ltd.

The company brings proven experience to the community. Its solutions already power secure data clean rooms for KDDI and support ongoing Confidential Computing research in collaboration with Intel Labs. Acompany’s participation will strengthen collective efforts to make Confidential Computing the foundation of secure data processing and privacy-preserving AI worldwide.

Community Collaboration in Action

Acompany is also engaging with CCC-hosted projects, including the Gramine framework. The team has actively participated in GitHub discussions and leveraged Gramine in their own research initiatives, helping to expand the practical applications of Confidential Computing technologies. In addition, Acompany contributes to the Consortium’s global outreach by supporting the Japanese translation of CCC’s White Papers & Reports, helping to broaden access to the Consortium’s insights and advance the global understanding and adoption of Confidential Computing.

Designing AI Data Safeguards Together: A Look Back at CCC’s San Francisco Workshop

By Blog No Comments

Last week in San Francisco, our community came together for a day that reminded us why collaborative learning and shared experimentation are so vital in the confidential computing ecosystem.

Attendees represented a wide range of perspectives, from hyperscale cloud service providers, startups, think tanks, and industry ranging from pharmaceuticals to finance, to discuss Confidential Computing. The day was filled with lively technical exchanges and even laughter over afternoon bacon (yes, bacon is a snack), it was the kind of workshop that makes innovation feel personal.

A Lineup That Inspired Collaboration

We were honored to hear from a remarkable roster of speakers representing organizations at the heart of secure and privacy-preserving computing, including:

  • Britt Law
  • Duality
  • Google
  • Meta / WhatsApp
  • NVIDIA
  • Oblivious
  • ServiceNow with Opaque
  • TikTok
  • Tinfoil

Each talk brought a unique perspective, from real-world deployments delivering measurable business value to bold experiments shaping the future of data protection. The diversity of voices reflected the Consortium’s strength: bringing together researchers, builders, and adopters to turn ideas into impact. The versatility of Confidential Computing was evident from the wide range of solutions and use cases presented.

From Inspiration to Imagination

The day wrapped up with our “Shark Tank”-style challenge, where four teams competed to design new use cases for Confidential Computing. The creativity on display was impressive, but one concept stood out – a secure, verifiable proof of humanity – a vision that perfectly captured the balance of trust, technology, and imagination our community strives for.

Community at the Core

Behind every successful event is a network of people who make it happen. This workshop was no exception. We’re deeply grateful to Laura Martinez (NVIDIA), Mateus Guzzo (TikTok) and Mike Ferron-Jones (Intel) for their incredible leadership in bringing everything together. Their effort ensured that even the smallest logistical details (and photo moments) went smoothly.

Looking Ahead

As we look to future workshops, we’ll keep building spaces like this one: open, hands-on, and human-centered. Because progress happens when we learn together, challenge ideas together, and celebrate the journey as much as the technology itself.

(Photos courtesy of Mateus Guzzo)

Welcoming FuriosaAI to the Confidential Computing Consortium

By Blog No Comments

The Confidential Computing Consortium (CCC) is pleased to welcome FuriosaAI as our newest startup member!

Furiosa is a semiconductor company pioneering a new type of AI chip for data centers and enterprise customers. With a mission to make AI computing sustainable and accessible to everyone, Furiosa offers a full hardware and software stack that enables powerful AI at scale.  Its proprietary Tensor Contraction Processor (TCP) architecture delivers world-class performance for advanced AI models, along with breakthrough energy efficiency compared to GPUs.

Furiosa’s flagship inference chip, RNGD (pronounced “renegade”), accelerates large language models and agentic AI workloads in any data center, including ones with power, cooling, and space constraints that make it difficult or impossible to deploy advanced GPUs. Currently sampling with Fortune 500 customers worldwide, RNGD is designed to power the next generation of AI applications with both high performance and significantly lower operating expenses.

Why Furiosa Joined CCC

As AI workloads scale, protecting data becomes increasingly critical. Furiosa’s energy-efficient chips enable businesses to run their models on-prem, so they can maintain complete control of their data and tooling. By joining the CCC, Furiosa is committed to collaborating with peers across the ecosystem to build a more secure and trustworthy AI infrastructure.

Furiosa hopes to contribute its expertise in hardware-accelerated inference while learning from the community’s efforts to standardize and advance confidential computing practices. The company is particularly interested in trusted execution environments and data security in AI workloads, and looks forward to identifying projects where its AI compute acceleration technology can add meaningful value.

In Their Own Words

“At Furiosa, we believe the future of AI depends on both performance and trust. By joining the Confidential Computing Consortium, we’re excited to collaborate with industry leaders to ensure AI innovation happens securely, sustainably, and at scale.”
Hanjoon Kim, Chief Technology Officer, FuriosaAI

We’re thrilled to have Furiosa join our community and look forward to the collaboration ahead. Welcome to the CCC!

Welcoming Phala to the Confidential Computing Consortium

By Blog No Comments

We are pleased to welcome Phala as the newest General Member of the Confidential Computing Consortium (CCC)! We’re glad to have Phala on board and greatly appreciate their support for our growing community.

About Phala

Phala is a secure cloud platform that enables developers to run AI workloads inside hardware-protected Trusted Execution Environments (TEEs). With a strong commitment to open-source development, Phala provides confidential computing infrastructure that ensures privacy, verifiability, and scalability. Their mission is to make secure and trustworthy AI deployment practical and accessible for developers worldwide.

Why Phala Joined CCC

By joining the CCC, Phala is partnering with industry leaders to advance open standards for confidential computing. Phala brings unique expertise through real-world deployment of one of the largest TEE networks in operation today, contributing valuable experience to help accelerate adoption of confidential computing.

At the same time, Phala looks forward to learning from the broader CCC community and collaborating to strengthen interoperability across the ecosystem.

Contribution to CCC-Hosted Projects

Phala is also contributing directly to CCC-hosted projects. Its open-source project, dstack, is now part of the Linux Foundation under the CCC. dstack is a confidential computing framework that simplifies secure application deployment in TEEs, providing verifiable execution and zero-trust key management to developers.

In Their Own Words

“Confidential computing is essential to the future of secure and trustworthy AI. By joining the Confidential Computing Consortium, we are deepening our commitment to building open-source, hardware-backed infrastructure that empowers developers everywhere. We are excited to contribute our experience operating one of the largest TEE networks and to collaborate with the community on shaping the future of confidential computing.”
Marvin Tong, CEO, Phala Network

Welcome to the September 2025 Newsletter

By Newsletter No Comments

In Today’s Issue

  1. From the Executive Director
  2. Outreach
  3. Upcoming Events
  4. From the TAC
  5. Recent News

Hello Community Member,

This month’s newsletter highlights the CCC’s strong presence at the AI Infrastructure Summit in Santa Clara, where members engaged end-users and ecosystem partners through panels, podcasts, and booth activities. Looking ahead, the big focus is the upcoming Designing AI-Ready Data Safeguards with Confidential Computing” workshop on October 20 in San Francisco, led by Intel, Nvidia, and TikTok, which will explore practical strategies for securing AI data pipelines. We’re also gearing up for OSFF New York (Oct 21–22) with a dedicated Confidential Computing track. Plus, check out recent member news, the new compliance resource hub, and the latest from Google Cloud expanding Confidential Computing with Intel TDX.

From the Executive Director 

This month saw the CCC sponsoring the AI Infra Summit in Santa Clara, California, with a number of activities including a panel and a podcast.  We also had a booth in the exhibition hall, staffed by members of the Consortium, with over a dozen different staff from a variety of member companies taking the time to talk about the CCC – and their companies’ work – to visitors.  One of the key features of the AI Infra Summit is that it included a large number of end-users, with the conference attracting not just supply-side but also demand-side attendees.  This mix was reflected in the interest and interactions we had at the booth, with a good number of both end-users and ecosystem partners coming to find out more about Confidential Computing and the Consortium.

In fact, one aspect of the ecosystem that has changed significantly over the past nearly six years since the founding of the Consortium is awareness of Confidential Computing as a technology, mirrored by availability both for cloud and in-house deployments.  As we work on our strategy for the next year, we are considering how to build on these changes in awareness and availability to help promote use, considering activities such as stronger engagement with regulators, creation of reference architectures and publication of more white papers.  Now is a good time to get involved to ensure that your priorities around Confidential Computing are reflected in the work we do: I look forward to seeing you at our meetings.

Outreach

Outreach continued its engagement efforts this month, connecting with the community at the AI Infrastructure Summit. Special thanks to members Anjuna, Hushmesh, Invary, and Mainsail for their leadership, and to TikTok, Intel, IBM, Google, and many others for their participation. Hushmesh led the Enterprise AI Panel and joined the TechArena podcast, Mainsail hosted the Pre-Show Online Seminar, and Invary led both the At-Show Live Session and the podcast. The CCC booth staffed by ~12 member representatives over three days drew strong traffic, and fostered meaningful engagement with attendees. The event was a great example of the member collaboration that drives our community forward.

Looking ahead, Outreach has been preparing for several exciting upcoming events:

  • Workshop: Designing AI-Ready Data Safeguards with Confidential ComputingOctober 20, 2025 | Hilton Canopy San Francisco SOMA, San Francisco, CAThis workshop, led by Intel, Nvidia and Tiktok,  will bring together experts and customers from industry and academia to explore how confidential computing can enable stronger safeguards for AI-ready data, with a focus on practical strategies for building privacy-preserving and secure data pipelines.
  • Open Source in Finance Forum (OSFF) New YorkOctober 21–22, 2025 | Convene, 225 Liberty St., New York, NYOSFF New York brings together leaders across financial services, open source, and technology to discuss the future of innovation in finance. Outreach will feature six dedicated talks in the Confidential Computing track, with participation from organizations such as Google, Red Hat, Symphony, Fr0ntierX, and Super Protocol. In addition, the broader OSFF program will spotlight major financial institutions including BNY Mellon, Morgan Stanley, and Citi, showcasing how confidential computing and open source are transforming the financial services landscape.

We look forward to sharing highlights and outcomes from these events in the next newsletter!

Upcoming Events

From the TAC

There are no new updates to share this month, as the TAC did not convene during this period. We look forward to providing the latest TAC news and progress in next month’s newsletter.

Recent News

Google Cloud has made Intel Trust Domain Extensions (TDX) generally available across its confidential VMs, GKE nodes, and GPU offerings. The update lets organizations protect data in use with simple console settings, adds support for secure AI/ML workloads on NVIDIA H100 GPUs, and introduces Intel’s Tiber Trust Authority attestation service with a free tier.

We’re proud to highlight CCC members Manu Fontaine (Hushmesh Inc.) and Jason Rogers (Invary) for representing the Confidential Computing Consortium on the Tech Arena podcast!

Recorded live as part of our activation at the AI Infrastructure Summit this week in Santa Clara, they did a fantastic job showcasing the benefits of Confidential Computing and advocating for the mission of the CCC. Listen to the full episode here.

This page is a resource hub to help organizations and practitioners navigate governance, security, and regulatory considerations in Confidential Computing. 

Explore guidance on: Workload governance, Verifier responsibilities, Ecosystem expectations, GDPR compliance in the AI era. 

Best regards,

The Confidential Computing Consortium

Let’s grow our community!  Share this with your network.
Subscribe to CCC Newsletter

Welcome to the August 2025 Newsletter

By Newsletter No Comments

In Today’s Issue

  1. From the Executive Director
  2. Outreach
  3. Upcoming Events
  4. From the TAC
  5. Recent News

Hello Community Member,

This month’s update highlights important progress across the Consortium, including insights from the TAC, Outreach, and Executive Director, as well as recent member news. From preparing strategic priorities for 2026 to hands-on technical advances and upcoming events like the AI Infrastructure Summit and our October workshop, the CCC continues to bring members together to shape the future of Confidential Computing. Read on for the latest updates!

From the Executive Director 

While the Consortium isn’t very busy with activities like conferences over August, that doesn’t mean that important work stands still.  I’ve been working with members of the leadership team to prepare us for 2026.  Budgets need to be approved towards the end of the year, of course, but we can’t start on that without a good understanding of what our strategic priorities should be for the next 12 months.  So we’ve been looking at what our options might be and are looking forward to the Governing Board meeting at the end of this month, where we hope to have a robust debate about what we might do.

One of the interesting things about the Consortium is the high number of start-ups who are (mostly) General Members, and balancing their interests with those of our larger members, some of whom are Premier Members. We work hard to ensure that the views, goals and concerns of smaller members are considered and represented at the strategic level, and the make-up of the Governing Board includes three representatives of the General Members, elected once a year to the Board.  We value their input and they each have a vote, equal with those of the Premier Members.

Outreach

Outreach took the month off to lay by the pool and drink mojitas (we wish!).  Actually, it’s been a sprint to prepare for upcoming events including the AI Infrastructure Summit in Santa Clara, California and plan our customer workshop in San Francisco.  CCC presence at AI Infrastructure Summit (September 9-11) is packed with member participation on panels, pre-show workshops, at-show sessions, podcasts, and a booth.  Thanks to members Anjuna, Hushmesh, Invary, and Mainsail for their leadership at the event.  Outreach is also planning a customer workshop for ~30 attendees on October 20 in San Francisco with a strong line-up of speakers on topics ranging from confidential AI, regulatory compliance, and even a build-your-own-use case exercise.  Tip of the hat to members Nvidia and TikTok for taking point on workshop planning.  And finally, the international survey results from our market research project with IDC are in, and we are looking forward to seeing the initial report at the Outreach meeting on September 3.  IDC is targeting delivery of their full report in early October, which will be available to all members.  Maybe we’ll get to lay by the pool in November?  We can hope.

Upcoming Events

Blog-Aug-27-2025-02-14-55-4391-PM

From the TAC

Despite August vacations a lot transpired this month in the Technical Advisory Council. ManaTEE delivered its first annual report from Mingshen Sun. Since joining a year ago the project has made its first community release, refactored a lot of the initial research code, and added a new TEE backend (Intel TDX). They also added documentation which is great for first time users and contributors and have a slick webpage.

We also got an update on the RISC-V confidential computing architecture, CoVE from Ravi Sahita. Ravi walked us through the CoVE Application Binary Interface and Reference Architecture. Much of the collaboration for this work takes place in a sister organization in the Linux Foundation. Learn more.

We also heard from Red Hat’s Dr. Chris Butler. Chris talked about his experiences in the field applying Confidential Computing to real customer problems. It was a great ground truth on customer perceptions of the technology. One of my main takeaways was the importance of compliance in customer decisions. This has been a big topic across the Consortium and one that we need even more focus on. You can watch all of this in our TAC playlist on youtube – check out the August 7th meeting.

Recent News

  • We’re excited to welcome QLAD to the CCC as a new Start-up Member! QLAD is a Kubernetes-native confidential computing platform delivering pod-level TEEs, encrypted Armored Containers™, and post-quantum resilience—making confidentiality scalable and production-ready. With contributions already in the Confidential Containers project and a vision to simplify secure computing, QLAD is helping define the next era of Confidential Computing. Read the announcement.

Best regards,

The Confidential Computing Consortium