Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access to view the operations and extract the intellectual property or private operations of an executing process. With Confidential Computing, the process is run protected, so its operation is hidden even from the owner of the computer it is running on. Join in today and listen to some great explanations on how to protect your valuable intellectual property today.
NCF-329 API Marketplace and business opportunities
NCF-328 How fast is the Cloud Migration Moving
NCF-326 Cybersecurity Research
NCF-325 Security as a Business Value Proposition
NCF-324 Cybersecurity for Everyone
NCF-323 Psychology of Trust Digitally
NCF-322 Critical infrastructure of Zero Trust
NCF-321 Part 2 of Zero Trust
NCF-320 Zero Trust
NCF-319 Cloud Security with Kubernetes
NCF-IEEE12 Global Efforts in Digital Privacy
NCF-317 Cybersecurity Buzz words
NCF-316 Recapping What We heard from our Guest in 2022
NCF-315 FAA Grounding Incident
NCF-314 Status of Cybersecurity for Critical Infrastructure
NCF-313 The Future of Cybersecurity
NCF-IEEE11 Applying Smart Contracts to the Energy Space.
NCF-IEEE10 Advancements of Health Technology and Cybersecurity
NCF-312 Understanding Those Starting in Cybersecurity.
NCF-IEEE9 Blockchain Security and Energy Transition
Create your
podcast in
minutes
It is Free
The Commercial Edge: Unleash the Power of People
The emPOWERed Half Hour
Aligned Money Show
Gorse Culture PODcast : The H.R. Detective Agency!
HCI Leadership Revolution
The Ramsey Show
Planet Money