
Sign up to save your podcasts
Or


Send us a text
Chris Daly, host of the Active Cyber Zone, discusses the evolution, use cases, and benefits of Confidential Computing with Ron Perez, Intel Fellow and Chief Security Architect. From the cloud, to the edge, to the endpoint, Confidental Computing is seeing an uptick of adoption and new applications as industry and governments recognize the need for hardware-based separation and attestation to build a trustworthy stack - and one that is secure by design.
By Chris Daly of Active CyberSend us a text
Chris Daly, host of the Active Cyber Zone, discusses the evolution, use cases, and benefits of Confidential Computing with Ron Perez, Intel Fellow and Chief Security Architect. From the cloud, to the edge, to the endpoint, Confidental Computing is seeing an uptick of adoption and new applications as industry and governments recognize the need for hardware-based separation and attestation to build a trustworthy stack - and one that is secure by design.