Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access to view the operations and extract the intellectual property or private operations of an executing process. With Confidential Computing, the process is run protected, so its operation is hidden even from the owner of the computer it is running on. Join in today and listen to some great explanations on how to protect your valuable intellectual property today.
NCF-08 The Government Is Reaching Out For Private Industry Support
NCF-07 The Place of Public Private Partnerships In the Cyber World
NCF-09 Learn About The Next Tech Giants Solving Some Large Problems in the Cyber World
NCF-05 Inside the Colorado Economic Development effort - Candid interview with NCC Executive Director Gen. Ed Anderson.
NCF-04 The Colorado Springs Regional Business alliance has some aggressive schedules for Cyber Economic Development
NCF-03 We Need to Combine Both Government and Commercial Cyber Security - with NREL’s Dr. Erfan Ibrahim
NCF-02 Introducing the First Season of New Cyber Frontier Guests
NCF-06 Living the Nightmare of Identity theft, A First Hand Account
NCF-01 What is The New Cyber Frontier All About
Create your
podcast in
minutes
It is Free
The emPOWERed Half Hour
NABOR® TALKS
U.S Property Podcast
Aligned Money Show
The Ramsey Show
Planet Money