Today, data is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Organizations that handle sensitive data such as Personally Identifiable Information (PII), financial data, or health information need to mitigate threats that target the confidentiality and integrity of either the application or the data in system memory.
In this webinar, experts from the Confidential Computing Consortium (CCC) will define Confidential Computing, discuss how businesses are using Confidential Computing today, and review the ecosystem of solutions and open-source projects available to enable applications to make use of Confidential Computing.