Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access to view the operations and extract the intellectual property or private operations of an executing process. With Confidential Computing, the process is run protected, so its operation is hidden even from the owner of the computer it is running on. Join in today and listen to some great explanations on how to protect your valuable intellectual property today.
NCF-358 Post Digital Transformation Cybersecurity
NCF-357 AI Friend or Foe
IEEE13 Megatrends Driving the Future of Technology
NCF-356 Spatial Web = 3D internet
NCF-355 I'm an Average User - What does security do for me?
NCF-354 Branding to Attract Investment
NCF-353 Preparing Cyber Startups for Investor Engagement
NCF-352 Renewable Energy Effects on Critical Infrastructure
NCF-351 Contrasting Consumer Security Needs
NCF-347 Cyber Physical Security
NCF-350 Modernizing for the Future: Navigating Legacy System Upgrades
NCF-349 Colorado Cyber-Tech Startup Capital
NCF-348 Cybersecurity Takes Flight
NCF-346 Escalating Effectual DevOps
NCF-345 Sustainability of Cybersecurity in the AI Era
NCF-344 Protecting your Data Wealth
NCF-343 Post Digital Transformation Philosophy
NCF-342 On the 2024 Cyber Frontier
NCF-341 Exploring New Methods of Distributed Trust
NCF-340 It Takes a Community to Build Next-Gen Cyber
Create your
podcast in
minutes
It is Free
The Business Of
The Everyday Millionaire
Pure Hustle Podcast
Making Bank
The Ramsey Show
Planet Money