• About Us
  • Contact Us
  • Cookie policy (EU)
  • Home
  • Privacy Policy
  • Video
  • Write for us
Today Headline
  • HOME
  • NEWS
    • POLITICS
    • News for today
    • Borisov news
  • FINANCE
    • Business
    • Insurance
  • Video
  • TECHNOLOGY
  • ENTERPRISE
  • LIFESTYLE
    • TRAVEL
    • HEALTH
    • ENTERTAINMENT
  • AUTOMOTIVE
  • SPORTS
  • Travel and Tourism
  • HOME
  • NEWS
    • POLITICS
    • News for today
    • Borisov news
  • FINANCE
    • Business
    • Insurance
  • Video
  • TECHNOLOGY
  • ENTERPRISE
  • LIFESTYLE
    • TRAVEL
    • HEALTH
    • ENTERTAINMENT
  • AUTOMOTIVE
  • SPORTS
  • Travel and Tourism
No Result
View All Result
TodayHeadline
No Result
View All Result

What You Need to Know About Confidential Computing

August 1, 2022
in Enterprise
0
What You Need to Know About Confidential Computing
0
SHARES
4
VIEWS
Share on FacebookShare on Twitter


Opinions expressed by Entrepreneur contributors are their own.

With an expected compound annual growth rate of up to 95.6% between 2021 and 2026, confidential computing is poised to become one of the hottest trends in cybersecurity in the next few years — especially in high-risk sectors (and some of our most important ones), such as finance and healthcare.

Let’s look at how it’s changing the game regarding storing confidential data and which companies are paving this innovative way.

Related: Cybersecurity Is No Longer An Option. Your Money Is in Immediate Danger.

What is confidential computing?

Digitalization has always come with a dilemma about what happens to personal information. Events like the Cambridge Analytica scandal and numerous accounts of major organizations having their systems hacked highlight how much is at risk when we use computers and technology.

It is bad enough on an individual level — nobody wants their bank details or intimate photos stolen. But for businesses and governments, the consequences of reaching sensitive information are even more worrying. And there is a reason for worry — one report found that the number of data breaches in 2021 grew by 17% compared to 2020. So the problem, as it seems, is here to stay.

Confidential computing offers a solution by protecting data while it’s still in use. Unlike most encryption methods, it focuses on data that are still being processed (when it remains unencrypted in memory) rather than after. More specifically, it isolates sensitive information and puts it in a separate, protected enclave, usually using cloud technology. Then, nobody can access the data without an authorized application code — and if an unauthorized code (such as malware) tries to get in, they’re denied access.

Related: A Business Leader’s Beginner Guide to Cybersecurity

How confidential computing could change the world

Understanding the theory of confidential computing is a great start, but to deeply comprehend its potential, you must look at use cases. Given the term itself has “confidential” in the name, the method is an extension of cybersecurity. Since almost every business now relies on cybersecurity to look after its data on some level, the applications could reach just about any sector or industry; however, it’s most beneficial for the companies that face the highest risk when handling data — such as finance and healthcare companies.

Finance

Financial services like banks have always been targets for hacking attacks, potentially resulting in losses of hundreds of millions of dollars. It’s therefore a natural place to implement serious cybersecurity measures.

Confidential computing would allow different financial institutions to exchange data without leaving it vulnerable — for example, banks could share data and carry out analysis, allowing them to identify potentially suspicious patterns, which would make it easier to spot cases of fraud earlier on.

Healthcare

Our health is crucial to practically everything else we do in life, and sharing data with healthcare providers is unavoidable. But sharing it with the wrong hands, like information about our DNA or diseases, could cause serious problems. Cybersecurity is vital here, and confidential computing could provide a solution by protecting data even as healthcare professionals use it.

Confidential computing could pave the way for uses of the data that may have been deemed too risky previously. For example, collecting data on patients in critical condition and using AI to find patterns and understand what they may be suffering from. Meanwhile, healthcare organizations have been infamously slow to adjust to these new technologies, partly due to the complications of securing the data.

Related: Cybersecurity Practices That Protect Your Small Business

Companies leading the way

Unsurprisingly, some of the biggest names in tech and computing are leading the way regarding confidential computing.

Google Cloud is Google’s confidential computing offering, and it allows customers to encrypt their data as they use it through advanced CPUs. Plus, it allows people to collaborate without compromising security, which is crucial for businesses carrying out dynamic processes.

Then there’s IBM, which has a range of confidential computing services, including IBM Cloud Hyper Protect Cloud Services (providing end-to-end protection), IBM Cloud Data Shield (for containerized applications) and Secure Execution for Linux (for hybrid cloud environments).

Another name to watch is Microsoft Azure, Microfot’s cloud computing service to protect business and consumer data as they’re using it. Microsoft stores data in hardware and processes it after verifying the cloud environment to ensure security.

But there are also some lesser-known companies with some promising innovations. One of them is the leading Israeli cyber company Hub Security, which uses a variety of hardware and software solutions to store data, alongside AI tools to monitor data and model potential threats continuously. This could help solve some of the problems in healthcare and finance outlined previously.

Hub has already approved a merger with a special-purpose acquisition company worth $1.28 billion. The deal will give Hub $172 million to fund its business and potential money from institutional investors in Israel and the U.S. The deal shows that investors recognize its potential — as far as picking early winners in confidential computing goes, it seems like one to watch.

Related: How Cybersecurity Companies Can Appeal to a Digitally-Fatigued World

A more confidential future?

As confidential computing reinvents how business and security are carried out across various sectors, the companies at the heart of the industry, who provide the technology and the tools needed for confidential computing, are set to thrive and grow rapidly.

Previous Post

Project L will be free to play, with Illaoi joining the roster

Next Post

Meet the paranormal TikToker who looks for ghosts across the U.S at haunted locations 

Related Posts

Agile alertness: 6 principles to help your software design process succeed
Enterprise

Agile alertness: 6 principles to help your software design process succeed

iStockLately, the term "continuous" has...

Read more
Enterprise

Liz Truss and Rishi Sunak lay out plans for economy and energy crisis at latest hustings – video | Politics

At the latest Conservative party...

Read more
Could Rite Aid Be an Acquisition Target, Again?
Enterprise

Could Rite Aid Be an Acquisition Target, Again?

While Rite-Aid is a drugstore,...

Read more
Every Mac (and PC) user needs this utility
Enterprise

Every Mac (and PC) user needs this utility

AppleNow that we're in an...

Read more
Enterprise

Student loan interest rates cut again as inflation and cost of living soar | Student finance

Ministers have intervened to cut...

Read more
Load More
Next Post
Meet the paranormal TikToker who looks for ghosts across the U.S at haunted locations 

Meet the paranormal TikToker who looks for ghosts across the U.S at haunted locations 

  • Trending
  • Comments
  • Latest
Strictly: Ofcom assessing Steve Allen’s Tilly Ramsay comments

Strictly: Ofcom assessing Steve Allen’s Tilly Ramsay comments

Six times actors really romped in sex scenes that make 365 DNI look tame

Six times actors really romped in sex scenes that make 365 DNI look tame

What are the leaked photos of Kobe Bryant at the helicopter crash site?

What are the leaked photos of Kobe Bryant at the helicopter crash site?

Collapsed Doggy sex position promises clitoral stimulation for extra pleasure

Collapsed Doggy sex position promises clitoral stimulation for extra pleasure

Tomato Avocado Salad – Spend With Pennies

Tomato Avocado Salad – Spend With Pennies

What Are The Top Nasturtium Companion Plants?

What Are The Top Nasturtium Companion Plants?

National Schnauzer Day: Bring on the Beards!

National Schnauzer Day: Bring on the Beards!

Crew of 4 returns from International Space Station

About Us

Todayheadline the independent news and topics discovery
A home-grown and independent news and topic aggregation . displays breaking news linking to news websites all around the world.

Follow Us

Latest News

Tomato Avocado Salad – Spend With Pennies

Tomato Avocado Salad – Spend With Pennies

What Are The Top Nasturtium Companion Plants?

What Are The Top Nasturtium Companion Plants?

Tomato Avocado Salad – Spend With Pennies

Tomato Avocado Salad – Spend With Pennies

What Are The Top Nasturtium Companion Plants?

What Are The Top Nasturtium Companion Plants?

National Schnauzer Day: Bring on the Beards!

National Schnauzer Day: Bring on the Beards!

  • Real Estate
  • Education
  • Parenting
  • Cooking
  • NFL Games On TV Today
  • Travel and Tourism
  • Home & Garden
  • Pets
  • Privacy & Policy
  • Contact
  • About

© 2021 All rights are reserved Todayheadline

No Result
View All Result
  • Real Estate
  • Education
  • Parenting
  • Cooking
  • NFL Games On TV Today
  • Travel and Tourism
  • Home & Garden
  • Pets
  • Privacy & Policy
  • Contact
  • About

© 2021 All rights are reserved Todayheadline

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist