
Cloud and edge networks are setting up a new line of defense, called confidential computing, to protect the growing wealth of data users process in those environments.
Confidential Computing Defined Confidential computing is a way of protecting data in use, for example while in memory or during computation, and preventing anyone from viewing or altering the work.
Using cryptographic keys linked to the processors, confidential computing creates a trusted execution environment or secure enclave. That safe digital space supports a cryptographically signed proof, called attestation, that the hardware and firmware is correctly configured to prevent the viewing or alteration of their data or application code.
In the language of security specialists, confidential computing provides assurances of data and code privacy as well as data and code integrity.
What Makes Confidential Computing Unique? Confidential computing is a relatively new capability for protecting data in use.
For many years, computers have used encryption to protect data that's in transit on a network and data at rest, stored in a drive or non-volatile memory chip. But with no practical way to run calculations on encrypted data, users faced a risk of having their data seen, scrambled or stolen while it was in use inside a processor or main memory.
With confidential computing, systems can now cover all three legs of the data-lifecycle stool, so data is never in the clear.
Confidential computing adds a new layer in computer security - protecting data in use while running on a processor. In the past, computer security mainly focused on protecting data on systems users owned, like their enterprise servers. In this scenario, it's okay that system software sees the user's data and code.
With the advent of cloud and edge computing, users now routinely run their workloads on computers they don't own. So confidential computing flips the focus to protecting the users' data from whoever owns the machine.
With confidential computing, software running on the cloud or edge computer, like an operating system or hypervisor, still manages work. For example, it allocates memory to the user program, but it can never read or alter the data in memory allocated by the user.
How Confidential Computing Got Its Name A 2015 research paper was one of several using new Security Guard Extensions (Intel SGX) in x86 CPUs to show what's possible. It called its approach VC3, for Verifiable Confidential Cloud Computing, and the name - or at least part of it - stuck.
We started calling it confidential cloud computing, said Felix Schuster, lead author on the 2015 paper.
Four years later, Schuster co-founded Edgeless Systems, a company in Bochum, Germany, that develops tools so users can create their own confidential-computing apps to improve data protection.
Confidential computing is like attaching a contract to your data that only allows certain things to be done with it, he said.
How Does Confidential Computing Work? Taking a deeper look, confidential computing sits on a foundation called a root of trust, which is based on a secured key unique to each processor.
The processor checks it has the right firmware to start operating with what's called a secure, measured boot. That process spawns reference data, verifying the chip is in a known safe state to start work.
Next, the processor establishes a secure enclave or trusted execution environment (TEE) sealed off from the rest of the system where the user's application runs. The app brings encrypted data into the TEE, decrypts it, runs the user's program, encrypts the result and sends it off.
At no time could the machine owner view the user's code or data.
One other piece is crucial: It proves to the user no one could tamper with the data or software.
Attestation uses a private key to create security certificates stored in public logs. Users can access them with the web's transport layer security (TLS) to verify confidentiality defenses are intact, protecting their workloads. (Source: Jethro Beekman) The proof is delivered through a multi-step process called attestation (see diagram above).
The good news is researchers and commercially available services have demonstrated confidential computing works, often providing data security without significantly impacting performance.
A high-level look at how confidential computing works. Shrinking the Security Perimeters As a result, users no longer need to trust all the software and systems administrators in separate cloud and edge companies at remote locations.
Confidential computing closes many doors hackers like to use. It isolates programs and their data from attacks that could come from firmware, operating systems, hypervisors, virtual machines - even physical interfaces like a USB port or PCI Express connector on the computer.
The new level of security promises to reduce data breaches that rose from 662 in 2010 to more than 1,000 by 2021 in the U.S. alone, according to a report from the Identity Theft Resource Center.
That said, no security measure is a panacea, but confidential computing is a great security tool, placing control directly in the hands of data owners .
Use Cases for Confidential Computing Users with sensitive datasets and regulated industries like banks, healthcare providers and governments are among the first to use confidential computing. But that's just the start.
Because it protects sensitive data and intellectual property, confidential computing will let groups feel they can collaborate safely. They share an attested proof their content and code was secured.
Example applications for confidential computing include:
Companies executing smart contracts with blockchains
Research hospitals collaborating to train AI models that analyze trends in patient data
Retailers, tel
Most recent headlines
04/09/2025
Monumental Sports & Entertainment (MSE), in collaboration with Dalet, has been a...
18/04/2025
Director Andrew Ahn, alongside actors Youn Yuh-jung and Joan Chen, takes a photo of the audience after the premiere of his film The Wedding Banquet at Eccles ...
18/04/2025
In a ruling that could have a major impact on the digital advertising market, a federal judge has ruled that Google has monopolized some types of advertising te...
18/04/2025
Broadcast and cable TV news outlets saw strong social media growth in March, according to new data from the social video analytics company Tubular Labs ....
18/04/2025
Berklee Student Yukai Yang Named 2025 Yamaha Young Performing Artist The drummer secured a spot among the elite winners in this years competition.
By
Maddie...
18/04/2025
Boston Conservatory Alums Bring Real Women Have Curves to Broadway The Latin American immigrant community takes center stage in a new musical featuring Tatian...
18/04/2025
WASHINGTON The FCC's call for public comments and suggestions on outdated regulations that it should be eliminated, has prompted a slew of fillings from bro...
18/04/2025
In a ruling that could have a major impact on the digital advertising market, a federal judge has ruled that Google has monopolized some types of advertising te...
18/04/2025
PEARL RIVER, N.Y. Global media solutions company Active Media Services (AMS) has formed a new relationship with VideoAmp, a measurement company for linear TV, c...
18/04/2025
Netflix reported generally positive results for first-quarter 2025, with revenue up 13% year-over-year to $10.543 billion and operating income growing by 27% to...
18/04/2025
NHL Playoffs 2025: TNT Sports Hits the Road for Onsite Productions With Mobile U...
18/04/2025
EVSs S bastien Verlaine on U.S. Expansion, Next-Generation Products Beyond replay, offerings also target asset management and media infrastructure By Ken Kersc...
18/04/2025
ESPN Unleashes 4DREPLAY as NCAA Women's Gymnastics Championships Hit ABC Men's championships to follow Saturday night on ESPN2 By Brandon Costa, Direct...
18/04/2025
Visualizing Victory: The Latest in AR, XR, and Virtual Production in Live Sports This panel discussion featured leaders from ESPN, CBS Sports, Warner Bros. Disc...
18/04/2025
NHL Playoffs 2025: With 16 Games in First Six Days, ESPN Deploys Variety of Remo...
17/04/2025
Emilie Blichfeldt attends the 2025 Sundance Film Festival premiere of The Ugly ...
17/04/2025
R-GPS gives warfighters a decisive battlefield advantage by punching through adv...
17/04/2025
This year's NAB Show in Las Vegas marked a noticeable shift in the priorities of media and broadcast organisations. Gone are the days of chasing flashy, or ...
17/04/2025
class=attachment-thumbnail size-thumbnail f-align-center alt= decoding=async data-lazy-srcset=https://www.antonbauer.com/wp-content/uploads/2024/12/Amy-Daniel-1...
17/04/2025
SAN JOSE, Calif. Roku and Adobe have announced that they are collaborating on a real time data platform made possible by a a new integration of the Roku Data C...
17/04/2025
NEW YORK Internet advertising revenues demonstrated strong growth in 2024, increasing 14.9% year-over-year to $258.6 billion, according to the IAB Internet Adv...
17/04/2025
SDVI Earns Both Product and Project of the Year Awards at 2025 NAB Show
Brie Clayton April 17, 2025
0 Comments
Left to right, Geoff Stedman, CMO, SDVI...
17/04/2025
Singapore Polytechnic Readies Aspiring AV Professionals for Live IP Productions ...
17/04/2025
Calrec Wins 2025 NAB Show Product of the Year Award for True Control 2.0
Brie Clayton April 17, 2025
0 Comments
Image: The Calrec True Control 2.o on ...
17/04/2025
In Return to Berklee, Lucius Looks Back and Moves Forward From mood boards to live demos, the alumni band gave students an exclusive look at the process behin...
17/04/2025
DirecTV's free streaming service MyFree DirecTV has just added another eight channels from NBCUniversal....
17/04/2025
LOS ANGELES The virtual production company GameChanger has announced that it is expanding its global footprint by bringing its virtual production technology to ...
17/04/2025
DENVER The International Broadcaster Coalition Against Piracy (IBCAP) has announced that it has developed a proprietary, automated software-based system to iden...
17/04/2025
Pixalate's new CTV Device Market Share report for Q1 2025 shows that Roku has the highest open programmatic CTV device market share in the United States, wi...
17/04/2025
Edward J. Lewis III Named Senior Vice President of Institutional Advancement Lewis has more than 20 years of industry experience, leading fundraising initiati...
17/04/2025
The Curling Group Puts On Inaugural Curling All-Star Game in Nashville The location in Music City is intended to broaden the sport's appeal By Dan Daley, ...
17/04/2025
April 17th, 2025 Press Materials Available Here
Tribeca Festival 2025 Announces TV & NOW Lineup
World Premieres and Exclusive Cast Panels with Apple TV '...
17/04/2025
SVG Sit-Down: Cisco's Bryan Bedford on Providing End-to-End Support for Clie...
17/04/2025
FIFA's Oscar Sanchez on the Task of Producing a North American World Cup The head of host broadcast production spoke during SVG Europe's Football Summit...
17/04/2025
NBA Playoffs 2025: As Play-In Tourney Continues, TNT Sports Preps Escalated Game...
17/04/2025
NBA Playoffs 2025: ESPN's Postseason Run Highlighted by New Cameras, Player ...
17/04/2025
Back to All News
Dear Hongrang' Blends Mystery and Romance in New Period D...
17/04/2025
Back to All News
The Making of Frozen Hot Boys': Real Training, Real Sculp...
17/04/2025
Back to All News
A Charming Prince, A Feisty Commoner and One Unexpected Love S...
17/04/2025
Back to All News
Made in New Mexico: A Look Behind the Scenes at Our New Drama ...
17/04/2025
Big shout out for our Managing Director Simon Couchman who is running his 50th and final marathon ahead of his 50th birthday in fancy dress!
Simon hopes to ach...
17/04/2025
The broadcast industry is on the brink of a transformative revolution, and at th...
17/04/2025
Festival programme promises a feast of drama, an action-packed fringe festival a...
17/04/2025
Gold prospecting in Venezuela has led to a malaria resurgence, but researchers h...
17/04/2025
Facebook
Twitter
LinkedIn
Thursday, 17 April 2025 - The next step has now been taken in the Franco-German armaments project Main Ground Combat System (MGC...
17/04/2025
RT 's Ireland's Wild Islands wins Best Series at the 2025 International ...
17/04/2025
As the days grow longer and the flowers bloom, GFN Thursday brings a fresh lineup of games to brighten the week.
Dive into thrilling hunts and dark fantasy adv...
17/04/2025
A better way to predict a patient's risk of coronary artery disease Scripps Research scientists developed a model that more accurately identifies patients a...
16/04/2025
At a time when Sudanese women journalists face unprecedented challenges, She Speaks Sudan has provided a critical platform for training, mentorship, and collabo...
16/04/2025
It's an understatement to say that the Peabody Awards are major. The winners...