Skip to main content

Mike Bursell

Confidential Computing is encrypting data in use within a secure hardware environment. It completes the data security triangle since data at rest (in storage) and in transit (across networks) are routinely encrypted. Learn how today’s modern data centers are built on the latest hardware which provides isolated “mini-vaults” inside each CPU.

Source: Profian

Link: https://profian.com/white-paper/white-paper-whats-confidential-computing/

Jen Wike Huger

Title: Modern Community Management: A lesson through acronym
Author: Jen Wike Huger
Date: November 2, 2022

Learning how to start and run open source community programs starts with m-a-i-n-t-a-i-n-e-r-s. In this talk, find out what each letter in this acronym means for you, whether you’re interested in the field, just getting started in your new role, or a season community manager looking for some new tips!

Source: All Things Open 2022

Link: https://2022.allthingsopen.org/sessions/2-for-1-the-secret-to-sustainable-open-source-create-your-open-source-project/

Nathaniel McCallum

Title: Unlocking the Cloud with Confidential Computing
Author: Nathaniel McCallum
Date: November 1, 2022

CPUs (and even GPUs) which support Confidential Computing are rapidly making inroads into the Cloud, unlocking the Cloud to organizations from sectors like healthcare and finance, who require greater assurances that their sensitive code and data are protected, and who have so far been unable to benefit from the Cloud’s many advantages.

In this session, we’ll define Confidential Computing, explain how process-based and VM-based TEEs (Trusted Execution Environments) differ, describe the importance of attestation, and explore existing and upcoming CPUs (and GPUs) that support Confidential Computing: from Intel’s SGX2 and TDX, AMD’s SEV-SNP, IBM’s PEF, Arm’s Realms, RISC-V’s Sanctum, to NVIDIA’s A100.

We’ll use Enarx, an open source project which is part of the Linux Foundation, to illustrate how Confidential Computing works, and we’ll showcase some examples to demonstrate why Confidential Computing is key to unlocking the Cloud’s true potential.

Source: All Things Open 2022

Link: https://2022.allthingsopen.org/sessions/unlocking-the-cloud-with-confidential-computing/

Mike Bursell

Every time an application runs on any platform – from the largest mainframe to the smallest IoT device – it executes code as on physical hardware. Given that not all applications, nor all users, are friendly in all cases (and applications that are friendly may be badly written or compromised), there is a need to isolate them from each other and from the host system. Learn how Confidential Computing provides protection from the host on which an application is running.

Source: Profian

Link: https://profian.com/white-paper/white-paper-managing-insider-risk-with-confidential-computing/

PDF: Managing Insider Risk with Confidential Computing