June 17, 2020

901 words 5 mins read

The IT Pro Podcast: The secrets of confidential computing

The IT Pro Podcast: The secrets of confidential computing

We’ve heard a lot about cloud computing, edge computing and various other kinds of computing, but confidential computing is less well known. As an emerging encryption model, it promises to offer greater protection to data as it’s being used, supplementing at-rest and in-transit encryption. Protecting against attacks like memory dumps and malicious root user compromise, the development of confident

ial computing is being spearheaded by the Confidential Computing Consortium, an open-source industry group working to address the problem. In this week’s episode, we talk to Dr Richard Searle, senior security architect at Fortanix and general member’s representative to the governing board of the consortium, about what the technology aims to do. In this week’s news, we discuss Apple’s decision to make its own Mac chips and other announcements from its annual WWDC conference, HPE’s new software portfolio, and the case of a disgruntled ex-director who deleted all the files in her former employers’ Dropbox account. Footnotes News Apple abandons Intel in favour of custom ARM-based Mac CPUsWWDC 2020: Apple unveils macOS Big Sur, iOS 14 and more HPE launches Ezmeral software portfolio – but is it just SBS in disguise? Businesswoman sentenced for illegally deleting company files

In-depth The future of encryptionTech giants assemble to tackle cloud and data security What are Meltdown and Spectre and are you affected? A complete guide to data encryption What is AES encryption? Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?

Bonus episodes BONUS: What to expect from day one of IT Pro LiveBONUS: What’s coming up in day two of IT Pro Live BONUS: Security in focus at IT Pro Live day three BONUS: Fuelling innovation at IT Pro Live day four BONUS: IT Pro Live goes back to the future

Subscribe Subscribe to The IT Pro Podcast on Apple PodcastsSubscribe to The IT Pro Podcast on Google Podcasts Subscribe to The IT Pro Podcast on Spotify Subscribe to the IT Pro newsletter Subscribe to IT Pro 20/20 Register for IT Pro Live

Date: 2020-06-25

URL: http://feeds.itpro.co.uk/~r/ITPro/Today/~3/fPA8ymF9LH4/the-it-pro-podcast-the-secrets-of-confidential-computing


Five business benefits of Digital Transaction Management (2019-06-24) Digital Transaction Management DTM is a type of business application that uses cloud-based software and services to digitally manage document-based transactions It encompasses digital signatures e-signatures document workflow and archiving authentication and automation and is seen as a key step in an organisations digital transformation journey In other words DTM takes the processes many businesse..
People can’t resist opening LinkedIn phishing emails (2020-11-16) Phishing emails mentioning LinkedIn in their subject lines are the most likely to be opened by victims according to new data from Atlas VPN Atlas VPN says that LinkedIn phishing emails had a 47% open rate in the third quarter of 2020 making them the most common social media scam for the third year running SEE MORE Over half of all phishing emails aimed at PayPal users with eBay accounts not far be..
Biden win ‘would be good for global tech’ (2020-11-05) A tech sector lobby group hassaid that Joe Biden being electedpresident of the United States could have a positive effect on the global tech industry The Democratic candidates openness to international collaboration data privacy and tougher digital taxation stand instark contrast to Donald Trumpsapproach to date according to Tech London Advocates TLA SEE MORE TLA: From Brexit to the coronavirus st..
Google Pixelbook Go review gallery (2020-12-02) This first-party Chromebook is a slice of budget-friendly brilliance
Sophos warns customers of potential data leak (2020-11-26) UK cyber security firm Sophos has notified customers that data has potentially been leaked onlinedue to a misconfigured database The company said it was alerted to the misconfiguration by a security researcher and that it fixed the issue immediately SEE MORE What is the dark web? SEE MORE How to react to a data breach SEE MORE How to avoid cloud misconfigurations for operational excellence However..
Remote working is here to stay, says Ginni Rometty (2020-11-11) Remote working and digital transformation plans wont go back to normal following the release a COVID-19 vaccine according to IBMs former CEO Ginni Rometty Speaking to CNBC IBMs executive chair said that remote work was here to stay as part of a hybrid model of working SEE MORE Ginni Rometty: New collar jobs are needed in the digital age SEE MORE The coronavirus outbreak is the clouds chance to shi..
Acer Swift 3 (2020) review gallery (2020-11-17) Acer deploys an AMD CPU to provide huge performance but this machine suffers in other areas
MPs bash Amazon and Apple over UK e-waste crisis (2020-11-26) Large tech companies and online retailers are flagrantly dodging their environmental responsibilities by dumping hundreds of thousands of tonnes of electronic waste each year MPs have argued Companies such as Amazon and Apple have adopted practices that discourage recycling and repairs the House of Commons Environmental Audit Committee EAC has concluded at a time when 155000 tonnes of e-waste is d.. MPs bash Amazon and Apple over UK e-waste crisis
Hackers could trick scientists into making deadly toxins (2020-11-30) According to Ben-Gurion University of the Negev cyber security researchers hackers could trick unwitting biologists into generating dangeroustoxinsin their labs Criminals generally must have physical contact witha dangeroussubstance to produce and deliver it However a new paper just publishedinNature Biotechnology claims its now possible for malware to easily replace a short substring of the DNA o..
Asus Zenbook Duo UX481 review (2020-12-02) Innovation that comes at a cost