
Cloud and edge networks are setting up a new line of defense, called confidential computing, to protect the growing wealth of data users process in those environments.
Confidential Computing Defined Confidential computing is a way of protecting data in use, for example while in memory or during computation, and preventing anyone from viewing or altering the work.
Using cryptographic keys linked to the processors, confidential computing creates a trusted execution environment or secure enclave. That safe digital space supports a cryptographically signed proof, called attestation, that the hardware and firmware is correctly configured to prevent the viewing or alteration of their data or application code.
In the language of security specialists, confidential computing provides assurances of data and code privacy as well as data and code integrity.
What Makes Confidential Computing Unique? Confidential computing is a relatively new capability for protecting data in use.
For many years, computers have used encryption to protect data that's in transit on a network and data at rest, stored in a drive or non-volatile memory chip. But with no practical way to run calculations on encrypted data, users faced a risk of having their data seen, scrambled or stolen while it was in use inside a processor or main memory.
With confidential computing, systems can now cover all three legs of the data-lifecycle stool, so data is never in the clear.
Confidential computing adds a new layer in computer security - protecting data in use while running on a processor. In the past, computer security mainly focused on protecting data on systems users owned, like their enterprise servers. In this scenario, it's okay that system software sees the user's data and code.
With the advent of cloud and edge computing, users now routinely run their workloads on computers they don't own. So confidential computing flips the focus to protecting the users' data from whoever owns the machine.
With confidential computing, software running on the cloud or edge computer, like an operating system or hypervisor, still manages work. For example, it allocates memory to the user program, but it can never read or alter the data in memory allocated by the user.
How Confidential Computing Got Its Name A 2015 research paper was one of several using new Security Guard Extensions (Intel SGX) in x86 CPUs to show what's possible. It called its approach VC3, for Verifiable Confidential Cloud Computing, and the name - or at least part of it - stuck.
We started calling it confidential cloud computing, said Felix Schuster, lead author on the 2015 paper.
Four years later, Schuster co-founded Edgeless Systems, a company in Bochum, Germany, that develops tools so users can create their own confidential-computing apps to improve data protection.
Confidential computing is like attaching a contract to your data that only allows certain things to be done with it, he said.
How Does Confidential Computing Work? Taking a deeper look, confidential computing sits on a foundation called a root of trust, which is based on a secured key unique to each processor.
The processor checks it has the right firmware to start operating with what's called a secure, measured boot. That process spawns reference data, verifying the chip is in a known safe state to start work.
Next, the processor establishes a secure enclave or trusted execution environment (TEE) sealed off from the rest of the system where the user's application runs. The app brings encrypted data into the TEE, decrypts it, runs the user's program, encrypts the result and sends it off.
At no time could the machine owner view the user's code or data.
One other piece is crucial: It proves to the user no one could tamper with the data or software.
Attestation uses a private key to create security certificates stored in public logs. Users can access them with the web's transport layer security (TLS) to verify confidentiality defenses are intact, protecting their workloads. (Source: Jethro Beekman) The proof is delivered through a multi-step process called attestation (see diagram above).
The good news is researchers and commercially available services have demonstrated confidential computing works, often providing data security without significantly impacting performance.
A high-level look at how confidential computing works. Shrinking the Security Perimeters As a result, users no longer need to trust all the software and systems administrators in separate cloud and edge companies at remote locations.
Confidential computing closes many doors hackers like to use. It isolates programs and their data from attacks that could come from firmware, operating systems, hypervisors, virtual machines - even physical interfaces like a USB port or PCI Express connector on the computer.
The new level of security promises to reduce data breaches that rose from 662 in 2010 to more than 1,000 by 2021 in the U.S. alone, according to a report from the Identity Theft Resource Center.
That said, no security measure is a panacea, but confidential computing is a great security tool, placing control directly in the hands of data owners .
Use Cases for Confidential Computing Users with sensitive datasets and regulated industries like banks, healthcare providers and governments are among the first to use confidential computing. But that's just the start.
Because it protects sensitive data and intellectual property, confidential computing will let groups feel they can collaborate safely. They share an attested proof their content and code was secured.
Example applications for confidential computing include:
Companies executing smart contracts with blockchains
Research hospitals collaborating to train AI models that analyze trends in patient data
Retailers, tel
Most recent headlines
06/10/2025
France T l visions, France's leading broadcaster, has received the 2025 EBU ...
04/09/2025
Monumental Sports & Entertainment (MSE), in collaboration with Dalet, has been a...
18/08/2025
ATLANTA Gray Media, Inc. has reached an agreement with the Fox Television Network that extends and renews the network affiliations for all of Gray's Fox aff...
18/08/2025
Berklee Announces Fall 2025 Signature Series This year's concerts feature Sasha Berliner, Samora Pinderhughes, and Rakim, alongside tributes to Bob Dylan,...
18/08/2025
Dorico Music Software: Tips for Switching from Finale Professor Lee Abe explains the music composition software and how it compares to the now-sunset Finale.
...
18/08/2025
When it comes to public access, education, and government (PEG) broadcasting, the needs of each community are unique-but the challenges often look the same. Whe...
17/08/2025
Mavis Camera, the fully-featured camera app for iPhone, now supports Atomos Ninja Phone, allowing content creators to connect professional cameras and lenses vi...
17/08/2025
TV Skyline, one of Germany's leading broadcast providers, supports a wide range of high-profile productions across Europe and beyond. From Bundesliga and Ch...
17/08/2025
Beamr Imaging Ltd. (NASDAQ: BMR), a leader in video optimization technology and solutions, will unveil its latest innovation Live 4K Super Resolution with vid...
17/08/2025
Amagi, a cloud-based SaaS technology solutions provider for broadcast and streaming TV, today announced its collaboration with DAZN, the world's leading spo...
17/08/2025
Grass Valley, the media and entertainment industry's leading technology innovator, today announced that Sky Network Television, New Zealand's largest pa...
17/08/2025
Cinegy, the premier provider of software-defined television technology, today announced a strategic partnership with ROCKET, a Toronto-based integrated solution...
17/08/2025
IABM will deliver its most comprehensive IBC program to date, with the new IABM Hub serving as the venue for an expanded range of activities designed to connect...
17/08/2025
Keepit, the only vendor-independent cloud dedicated to SaaS data protection, today announced it has successfully achieved its SOC 2 Type 1 attestation report. T...
17/08/2025
Combining scalability and robust disaster recovery while reducing its onsite footprint, NEP UK has streamlined its English Football League (EFL) coverage for Sk...
17/08/2025
Operative, a preferred advertising management solution for the world's leading media companies and Oracle partner, today announced that AOS, an intelligent ...
17/08/2025
MediaKind today announced that its elastic, cloud-native streaming platform, MK.IO, supported the seamless, high-quality streaming of the FIFA Club World Cup 20...
17/08/2025
Bitmovin, the leading provider of video streaming solutions, today announced the release of Bitmovin React Native SDK v1.0 for the Bitmovin Player. This major u...
17/08/2025
Mark Roberts Motion Control (MRMC), a Nikon Company, a global leader in robotic camera systems, today announces the release of the Cinebot Nano, a revolutionary...
16/08/2025
BALTIMORE Sinclair has announced that its free, over-the-air multicast networks Charge, Comet, Roar, and The Nest have concluded a series of national distributi...
16/08/2025
BOSTON EditShare will unveil its latest Ultimate EFS Nodes, optimized for high-performance media workflows at any scale, during IBC2025, Sept. 12-15, at the RAI...
16/08/2025
WASHINGTON PBS has informed public stations that it plans to cut its budget by about 21% as part of an effort to deal with the elimination of Federal funding an...
16/08/2025
ATLANTA Gray Media has named Bob Kroeger chief technology officer for the company, effective immediately. Bob has served as chief information officer for both G...
15/08/2025
On an otherwise ordinary Wednesday afternoon at one of New York City's most iconic museums, Spotify treated visitors to an extraordinary surprise. As patron...
15/08/2025
At 12:12 AM on August 12, Times Square lit up with something new: a bright-orang...
15/08/2025
Introduction Most engineers understand how to impedance match an antenna to 50 ohms. But what actually makes an antenna radiate? And why do some antennas radiat...
15/08/2025
Siretta was proud to support our new Japanese distribution partner, Midoriya Electric, at COMNEXT Japan.
Together, we showcased the SNYPER-5G, our advanced cel...
15/08/2025
Link ping, Sweden, September 9, 2024 - Agama, the specialist in video observability & analytics for service quality and customer experience, announced today th...
15/08/2025
Amsterdam, Netherlands, September 10th, 2024 - Agama, the specialist in video ob...
15/08/2025
Amsterdam, Netherlands, September 13, 2024 - Agama, the specialist in video observability & analytics for service quality and customer experience, today announc...
15/08/2025
Link ping, Sweden, October 08, 2024 - Agama, the specialist in video observability & analytics for service quality and customer experience, today announced that...
15/08/2025
Link ping, Sweden, April 24, 2025 - a specialist in video observability & analytics for service quality and customer experience, today announced that Hrvatski T...
15/08/2025
Link ping, Sweden, May 14, 2025 - Agama, a specialist in video observability & analytics for service quality and customer experience, today announced that Polis...
15/08/2025
Arlen Borrego Miranda Awarded 2025 Prodigy Scholarship by Latin Grammy Cultural ...
15/08/2025
WASHINGTON The pay TV and telco industry-backed American Television Alliance told staffers at the Federal Communications Commission's Media Bureau that the ...
15/08/2025
PHILADELPHIA and SUWANEE, Ga. Hisense and Xumo, the streaming joint venture between Comcast and Charter Communications, have announced the launch of Hisense Cha...
15/08/2025
SURREY, U.K. Mark Roberts Motion Control (MRMC) has launched the Cinebot Nano, a motion control robot designed to make professional-grade camera movement more a...
15/08/2025
15 Aug 2025
KYIV Ticker Goes Live on Nasdaq as Kyivstar Group Commences Trading Landmark listing makes Kyivstar the first and only publicly listed pure-play ...
15/08/2025
Upgrade and Save - Now Through August 31st!
Enjoy 20% or more off all Ivory 3 and Ivory II Upgrades for a limited time.
If you've been considering unlocki...
15/08/2025
Back to All News
Netflix Celebrates Mexican Cinema Day by Announcing the Produc...
15/08/2025
Of around 7,000 languages in the world, a tiny fraction are supported by AI lang...
14/08/2025
(L-R) Clay Pateneaude, Tabatha Zimiga, Porshia Zimiga, director Kate Beecroft, Leanna Shumpert, Jesse Thorson, and Jennifer Ehle attend the premiere of East o...
14/08/2025
Colombia siempre ha sido potencia en innovaci n musical! Desde la revoluci n del reggaet n en Medell n, pasando por las escenas indie y rockeras en Bogot , y el...
14/08/2025
Colombia has long been a powerhouse of musical innovation. From Medell n's reggaet n revolution to Bogot 's indie and rock scenes and Cali's salsa l...
14/08/2025
As the mercury rises and the days stretch long, Spotify has been turning up the vibrant sounds of South America, Central America, and the Caribbean with our Ver...
14/08/2025
Statement on the passing of David Stratton
14 August, 2025
Insights & articles
Statement by SBS Managing Director, James Taylor
SBS is deeply saddened by...
14/08/2025
The best project was the Olympic Games ever since I was young, I have been passionate about sport and to have the opportunity to be in the Stade de France for ...
14/08/2025
MONTREAL Grass Valley today announced that Sky Network Television, New Zealand's largest pay-TV provider, has chosen Grass Valley' AMPP to overhaul its ...
14/08/2025
MIAMI Telemundo today debuts Telemundo Deportes Ahora, a 24/7 Spanish-language sports FAST channel, on Peacock, Xumo Play, the NBC News FAST hub and Telemundo.c...
14/08/2025
DENVER, Colo. Sports entertainment platform DAZN relied on the MediaKind MK.IO elastic, cloud-native streaming platform to support high-quality streaming of the...