Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access to view the operations and extract the intellectual property or private operations of an executing process. With Confidential Computing, the process is run protected, so its operation is hidden even from the owner of the computer it is running on. Join in today and listen to some great explanations on how to protect your valuable intellectual property today.
NCF-227 Understand Identity
NCF-226 New Concepts in Cyber Workforce Development
NCF-225 Human-Based Attacks
NCF-224 Level It Up pt. 2: Enabling Clientele
NCF-223 Concierge Cybersecurity
NCF-222 The Difference Between IT and OT Security
NCF-221 Responding to Insider Threats
NCF-220 Cyber Research in Academic Institutions
NCF-219 Creating a Paranoid Skillset
NCF-218 The Economics of Pricing in the Digital Age
NCF-217 Transforming Data into Action
NCF-216 Intersection of the Coronavirus and Cyber
NCF-215 Revisualizing Security with Mnemonic Devices
NCF-NCC03 Electronic Voting: How NCC is convening leaders through Secure the Vote
NCF-214 Giving Back with Open Source Security
NCF-213 Eye in the Sky: Casino Security
NCF-212 Balancing the Risk
NCF-211 Level It Up: Don’t Dumb Down Cyber
NCF-210 Security Baked into the Business Culture
NCF-209 Securing the IOT
Create your
podcast in
minutes
It is Free
The Commercial Edge: Unleash the Power of People
The emPOWERed Half Hour
Aligned Money Show
Gorse Culture PODcast : The H.R. Detective Agency!
HCI Leadership Revolution
The Ramsey Show
Planet Money