| | APRIL 20258CIOReviewIN MY OPINIONThe emerging hardware-based technology called Confidential Computing is set to underpin multiple new ways of securing your networks and data.At the core of Confidential Computing is a system's ability to keep the code and data it is working on hidden, even from the device's owner or administrator (and even if the device is hacked!). Such a system is also able to prove to a remote party, through a process called attestation, what code has executed, in which configuration, on what data, and what was the result. Said another way, whatever the system says has happened, really did happen, and whoever had the system in their possession, was not told what that was and couldn't do anything about it short of powering it off.If you own a mobile phone or a gaming console, you have already been touched by this technology, most likely without even being aware of this. On a mobile phone, Confidential Computing protects your payments and biometric data. Gaming consoles use it to prevent piracy, thwart attempts at cheating, and reject knock-off peripherals.These days, Confidential Computing is marching into the datacenter and beyond. With a slew of offerings from nearly every major hardware manufacturer and cloud service provider, across virtually all device categories CPUs, GPUs, and peripherals Confidential Computing delivers previously unimaginable capabilities.CONFIDENTIAL COMPUTING: THE EMERGING SECURITY MULTI-TOOLBy Mark Novak, Sr. Principal Architect, Cybersecurity Technology & Controls, JPMorgan ChaseMark Novak
<
Page 7 |
Page 9 >