Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access to view the operations and extract the intellectual property or private operations of an executing process. With Confidential Computing, the process is run protected, so its operation is hidden even from the owner of the computer it is running on. Join in today and listen to some great explanations on how to protect your valuable intellectual property today.
NCF-CO17 Cyber Education: How NCC is Taking on the Cyber Gap
NCF-208 What Managed Services Will I Need as My Company Grows?
NCF-CO16 Murray for ISSA President
NCF-207 The Importance of Awareness
NCF-DC07 COVID-19 Impact On Cybersecurity
NCF-206 Ecosystem Cybersecurity
NCF-205 Systems Engineering and Cybersecurity
NCF-204 Speed Computing Pioneer
NCF-203 Blockchain and IEEE
NCF-CO15 Women in Cybersecurity: Scope and Role of ISAC
NCF-202 Cyber Hygiene by the Numbers
NCF-201 A New Workforce -- Connecting Innovation to Cybersecurity
NCF-200 Operating within the Cloud
NCF-199 Identifying the Objective of an Adversary
NCF-198 Cybersecurity Education and Skills Development
NCF-197 How to Choose an MSP
NCF-196 Blockchain Evolution
NCF-195 Women in Cybersecurity: IT Training for Military Personnel
NCF-194 Learning and Thriving in IT Professions
NCF-193 Global Coordination
Create your
podcast in
minutes
It is Free
The Commercial Edge: Unleash the Power of People
The emPOWERed Half Hour
Aligned Money Show
Gorse Culture PODcast : The H.R. Detective Agency!
HCI Leadership Revolution
The Ramsey Show
Planet Money