Overview of Confidential Computing


Learn how Confidential Computing can improve system security.

Confidential Computing (CC) drastically reduces the attack surface of systems, says Mark Russinovich.

“While traditional systems encrypt data at rest and in transit, CC extends this protection to data in use. It provides a novel, clearly defined security boundary, isolating sensitive data within trusted execution environments during computation,” Russinovich says in this article in ACM Queue.

Other articles in the issue provide details on hardware isolation and creating the first confidential GPUs.

See this issue of ACM Queue for more information.



Related content

comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs

Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>


		<div class=