Increasing Trust in Confidential Computing with Project Amber | InTechnology Podcast

Subscribers:
257,000
Published on ● Video Link: https://www.youtube.com/watch?v=ent75tiNSkM



Category:
Show
Duration: 18:32
148 views
3


Customers are worried about security as they move their workloads to the Cloud and confidential computing can help address these concerns. Most customers want an independent entity to verify the trusted execution environment to ensure it is trustworthy for when data is in use. That trust authority is what we call Project Amber.

In this episode of Cyber Security Inside Live from The Green Room, Camille talks with Raghu Yeluri, Intel Senior Principal Engineer and Lead Security Architect from Intel’s Vision Conference in Texas.

You’ll learn:

•A high-level definition of Project Amber and overview of what confidential computing is.
•At the core, confidential computing is where data and IP get processed and the need to be protected and isolated from the platform and the infrastructure administrators.
•Why customers are worried about security as they move their workloads to the Cloud and how confidential computing can help address these concerns.
•The three stages of data protection: at rest, in transit, and data protection in use. Most customers want an independent entity to verify the trusted execution environment to ensure it is trustworthy. That trust authority is what we call Project Amber.

Read more about Advancing Confidential Computing with Intel’s Project Amber from Nikhil Deshpande and Raghu Yeluri here: https://buff.ly/3w0Bi8X

Check it out. For more information, previous podcasts, and full versions, visit our website at https://cybersecurityinside.com

If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms.

Apple Podcast: https://podcasts.apple.com/us/podcast...

Spotify: https://open.spotify.com/show/6RN4ATo...

Follow our hosts Tom Garrison and Camille Morhardt: Tom: @tommgarrison Camille: @morhardt

Learn more about Intel Cybersecurity: https://www.intel.com/content/www/us/...

Intel Compute Life Cycle (CLA): https://www.intel.com/content/www/us/...

About Intel Software:
Intel® Developer Zone is committed to empowering and assisting software developers in creating applications for Intel hardware and software products. The Intel Software YouTube channel is an excellent resource for those seeking to enhance their knowledge. Our channel provides the latest news, helpful tips, and engaging product demos from Intel and our numerous industry partners. Our videos cover various topics; you can explore them further by following the links.

Connect with Intel Software:
INTEL SOFTWARE WEBSITE: https://intel.ly/2KeP1hD
INTEL SOFTWARE on FACEBOOK: http://bit.ly/2z8MPFF
INTEL SOFTWARE on TWITTER: http://bit.ly/2zahGSn
INTEL SOFTWARE GITHUB: http://bit.ly/2zaih6z
INTEL DEVELOPER ZONE LINKEDIN: http://bit.ly/2z979qs
INTEL DEVELOPER ZONE INSTAGRAM: http://bit.ly/2z9Xsby
INTEL GAME DEV TWITCH: http://bit.ly/2BkNshu

#intelsoftware #intechnology #confidentialcomputing #projectamber #IntelVision

Increasing Trust in Confidential Computing with Project Amber | InTechnology Podcast




Other Videos By Intel Software


2023-08-16Demo | Intelligent Queue Management with YOLOv8 Object Detection & Counting Edge AI Reference Kit
2023-08-16Intelligent Queue Management with YOLOv8 Object Detection & Counting Edge AI Reference Kit
2023-08-16Introduction to OpenVINO| Intel Software
2023-08-16From Your Device to the Cloud: How AI is Reaching Everything | InTechnology Podcast
2023-08-15Cyber Attacks in the Cloud: How Do You Know Your Data is Safe? | InTechnology Podcast
2023-08-15Intel® GPA Utilities for Vulkan* | Intel® Graphics Performance Analyzers Framework Quick Tips
2023-08-15Google Talks Filter Bubbles: Explore vs. Exploit | InTechnology Podcast | Intel Software
2023-08-14Top Cybersecurity Threats: 2022 RSA Panelists Share Their Thoughts | InTechnology Podcast
2023-08-14Confidential Computing: Protecting Data at Every Point | InTechnology Podcast | Intel Software
2023-08-14SYCL ND-Range | Intel Software
2023-08-11Increasing Trust in Confidential Computing with Project Amber | InTechnology Podcast
2023-08-11Social-Technical Systems with Maria Bezaitis | InTechnology Podcast | Intel Software
2023-08-10OpenVINO Demos Overview | Intel Software
2023-08-09Overview of Intel® Optimizations for PyTorch* | Intel Software
2023-07-28Create Custom Layers | Intel® Graphics Performance Analyzers Framework Quick Tips | Intel Software
2023-07-27July 2023 | oneAPI Dev News | Intel Software
2023-07-27July 2023 | oneAPI Dev News | Intel Software
2023-07-26July 2023 | Intel Software
2023-07-26Introduction to Intel's AI Solutions Stack | Intel Software
2023-07-26Speed Up Inference with Mixed Precision | AI Model Optimization with Intel® Neural Compressor
2023-07-25July 2023 | IDZ News | Intel Software



Tags:
intel
intel business
intel it center
technology solution
intel computer
intel laptop
computers for business
best laptop
best computer
computer technology
intel edison
big data
pc computer
pc laptop
pc
pc intel
computer processor
e7 intel
technology
confidential
amber
trusted execution
running
service
verify
customers
processed
industry
workloads
verification
today
infrastructure
trusted
protected
called
compute
cloud
computing
project amber