Two years ago, a group of tech companies unveiled a new roadmap for cloud computing security. Confidential Computing “uses hardware-based techniques to isolate data, certain functions or an entire application from the operating system, hypervisor or virtual machine manager and other privileged processes,” says IEEE spectrum. So what makes this different from other digital defense efforts? How does it work?
Today’s Cloud Computing Security
Nowadays companies and government agencies are looking for a new way to protect their data in the cloud. This is all the more true for financial service customers, vehicle manufacturers, health insurers and telecommunications service providers. These sectors face specific compliance regulations as well as a growing number of broader data protection regulations.
Therefore, groups in these areas must uphold what IEEE Spectrum calls the “three pillars of data security” – protecting data at rest, in motion, and in use. These apply to cloud computing …