The Confidential Computing Consortium, formed under The Linux Foundation, could revolutionize the way companies share data. Tom Merritt lists five things to know about Confidential Computing.
You can protect data at rest–you encrypt it. You can protect data in transit–it’s a little trickier, but you can encrypt that, too. What about while you’re using it? You need to unencrypt the data to use it, right? It would be hard to read your email if it’s encrypted while you’re trying to look at it. That’s a problem because data you’re using is in memory, which can be dumped, and then malicious folks have your unencrypted data. There are some folks who believe you can protect data in use. Here are five things to know about Confidential Computing.
SEE: Identity theft protection policy (TechRepublic Premium)
In a world where sharing data is not only unpopular, but also risky, Confidential Computing could let companies collaborate in the cloud without ever having to expose their data or code to each other.
Subscribe to TechRepublic Top 5 on YouTube for all the latest tech advice for business pros from Tom Merritt.
Image: iStock/metamorworks