Protecting data

I’ve started to hear questions about encrypting memory. For decades the industry has used a model where root was god of a machine and could access anything. That has been changing – we now operate in environments where root isn’t the owner of the data or even the device. Confidential computing addresses this allowing software […]