PodParley PodParley

SilverLining Episode 48: Deep dive into Confidential computing

Guest: Yan Michalevsky Guest title:  Co-Founder and CTO at Anjuna Language: English   Abstract Confidential computing is one of the more interesting technologies that is developed today. The combination of using secure hardware features, advanced cryptography with tight virtualization integration enables us to protect data at untrusted environments and protect from very illusive threats such as government access and malicious insiders. In this episode we spoke with Yan Michalevsky, Co-Founder and CTO at Anjuna, regarding confidential computing and why we should pay attention to it.

Episode 48 of the SilverLining IL podcast, hosted by MarkeTech Group, titled "SilverLining Episode 48: Deep dive into Confidential computing " was published on March 16, 2022 and runs 37 minutes.

March 16, 2022 ·37m · SilverLining IL

0:00 / 0:00

Guest: Yan Michalevsky Guest title:  Co-Founder and CTO at Anjuna Language: English   Abstract Confidential computing is one of the more interesting technologies that is developed today. The combination of using secure hardware features, advanced cryptography with tight virtualization integration enables us to protect data at untrusted environments and protect from very illusive threats such as government access and malicious insiders. In this episode we spoke with Yan Michalevsky, Co-Founder and CTO at Anjuna, regarding confidential computing and why we should pay attention to it.

Guest: Yan Michalevsky

Guest title:  Co-Founder and CTO at Anjuna

Language: English

 

Abstract

Confidential computing is one of the more interesting technologies that is developed today.

The combination of using secure hardware features, advanced cryptography with tight virtualization integration enables us to protect data at untrusted environments and protect from very illusive threats such as government access and malicious insiders.

In this episode we spoke with Yan Michalevsky, Co-Founder and CTO at Anjuna, regarding confidential computing and why we should pay attention to it.

URL copied to clipboard!