
Cloud and edge networks are setting up a new line of defense, called confidential computing, to protect the growing wealth of data users process in those environments.
Confidential Computing Defined Confidential computing is a way of protecting data in use, for example while in memory or during computation, and preventing anyone from viewing or altering the work.
Using cryptographic keys linked to the processors, confidential computing creates a trusted execution environment or secure enclave. That safe digital space supports a cryptographically signed proof, called attestation, that the hardware and firmware is correctly configured to prevent the viewing or alteration of their data or application code.
In the language of security specialists, confidential computing provides assurances of data and code privacy as well as data and code integrity.
What Makes Confidential Computing Unique? Confidential computing is a relatively new capability for protecting data in use.
For many years, computers have used encryption to protect data that's in transit on a network and data at rest, stored in a drive or non-volatile memory chip. But with no practical way to run calculations on encrypted data, users faced a risk of having their data seen, scrambled or stolen while it was in use inside a processor or main memory.
With confidential computing, systems can now cover all three legs of the data-lifecycle stool, so data is never in the clear.
Confidential computing adds a new layer in computer security - protecting data in use while running on a processor. In the past, computer security mainly focused on protecting data on systems users owned, like their enterprise servers. In this scenario, it's okay that system software sees the user's data and code.
With the advent of cloud and edge computing, users now routinely run their workloads on computers they don't own. So confidential computing flips the focus to protecting the users' data from whoever owns the machine.
With confidential computing, software running on the cloud or edge computer, like an operating system or hypervisor, still manages work. For example, it allocates memory to the user program, but it can never read or alter the data in memory allocated by the user.
How Confidential Computing Got Its Name A 2015 research paper was one of several using new Security Guard Extensions (Intel SGX) in x86 CPUs to show what's possible. It called its approach VC3, for Verifiable Confidential Cloud Computing, and the name - or at least part of it - stuck.
We started calling it confidential cloud computing, said Felix Schuster, lead author on the 2015 paper.
Four years later, Schuster co-founded Edgeless Systems, a company in Bochum, Germany, that develops tools so users can create their own confidential-computing apps to improve data protection.
Confidential computing is like attaching a contract to your data that only allows certain things to be done with it, he said.
How Does Confidential Computing Work? Taking a deeper look, confidential computing sits on a foundation called a root of trust, which is based on a secured key unique to each processor.
The processor checks it has the right firmware to start operating with what's called a secure, measured boot. That process spawns reference data, verifying the chip is in a known safe state to start work.
Next, the processor establishes a secure enclave or trusted execution environment (TEE) sealed off from the rest of the system where the user's application runs. The app brings encrypted data into the TEE, decrypts it, runs the user's program, encrypts the result and sends it off.
At no time could the machine owner view the user's code or data.
One other piece is crucial: It proves to the user no one could tamper with the data or software.
Attestation uses a private key to create security certificates stored in public logs. Users can access them with the web's transport layer security (TLS) to verify confidentiality defenses are intact, protecting their workloads. (Source: Jethro Beekman) The proof is delivered through a multi-step process called attestation (see diagram above).
The good news is researchers and commercially available services have demonstrated confidential computing works, often providing data security without significantly impacting performance.
A high-level look at how confidential computing works. Shrinking the Security Perimeters As a result, users no longer need to trust all the software and systems administrators in separate cloud and edge companies at remote locations.
Confidential computing closes many doors hackers like to use. It isolates programs and their data from attacks that could come from firmware, operating systems, hypervisors, virtual machines - even physical interfaces like a USB port or PCI Express connector on the computer.
The new level of security promises to reduce data breaches that rose from 662 in 2010 to more than 1,000 by 2021 in the U.S. alone, according to a report from the Identity Theft Resource Center.
That said, no security measure is a panacea, but confidential computing is a great security tool, placing control directly in the hands of data owners .
Use Cases for Confidential Computing Users with sensitive datasets and regulated industries like banks, healthcare providers and governments are among the first to use confidential computing. But that's just the start.
Because it protects sensitive data and intellectual property, confidential computing will let groups feel they can collaborate safely. They share an attested proof their content and code was secured.
Example applications for confidential computing include:
Companies executing smart contracts with blockchains
Research hospitals collaborating to train AI models that analyze trends in patient data
Retailers, tel
Most recent headlines
06/10/2025
France T l visions, France's leading broadcaster, has received the 2025 EBU ...
04/09/2025
Monumental Sports & Entertainment (MSE), in collaboration with Dalet, has been a...
04/07/2025
Watching live sports on TV these days is a delicate balance for broadcasters how much information is too much?...
04/07/2025
WASHINGTON As Federal Communications Commission Chair Brendan Carr works to achieve his goal of a very busy, productive summer at the FCC, the agency has rele...
04/07/2025
Other World Computing Launches OWC Guardian USB-C Hardware-Encrypted Portable SS...
04/07/2025
CANAL Brings MotoGP to Vision Pro with Blackmagic URSA Cine Immersive
Brie Clayton July 3, 2025
0 Comments
Experience MotoGP like never before as CA...
03/07/2025
For our Vario-Jib, as well as for a repertoire of weights, we now have carts that make transport easier...
03/07/2025
One of our latest innovations: Slider Drive Unit!
Our Vario Slider not only comes with improvements and new features, but also with its own drive unit!
Our i...
03/07/2025
The 360 EVO lives up to its name: 360-degree rotation not only on the pan axis, but also on the roll axis, enables filmmakers to take their creative visions eve...
03/07/2025
What a buzzing few days at BSCExpo in London!
We were thrilled to connect with so many talented professionals from the world of cinematography.
A huge thank ...
03/07/2025
ADOLESCENCE - Shot with Panther Tower"The whole rig had to be detachable mid-episode
Netflix limited drama series Adolescence has been gaining attentio...
03/07/2025
To achieve a true level of decisive overmatch, communication systems must be as ...
03/07/2025
The Broadcasters Foundation of America has named Ray Hopkins, president of U.S. distribution at Paramount Global, to its board of directors....
03/07/2025
SIOUX FALLS, S.D. In his first major policy speech, Federal Communications Commission chair Brendan Carr outlined his Build America Agenda for the agency'...
03/07/2025
As the industry is making a major push to transition to NextGen TV and develop new businesses that will fund the next generation of broadcasting, TV Tech's ...
03/07/2025
Despite enabling its subscribers to watch films and TV shows in the highest possible resolution, Netflix has revealed it is taking things old school with the in...
03/07/2025
WASHINGTON In response to news that Paramount Global has agreed to pay $16 million to settle a lawsuit by President Donald Trump, Democrats and other administra...
03/07/2025
WUPPERTAL, Germany Riedel Communications today launched RefSuite for professional sports workflows....
03/07/2025
WEITERSTADT, Germany LYNX Technik, a provider of modular signal processing solutions, has announced that founder and longtime CEO Winfried Deckelmann is steppin...
03/07/2025
WASHINGTON Representatives from six trade groups representing tech, pay TV, broadband, LPTV and other sectors recently met with Federal Communications Commissio...
03/07/2025
PLYMOUTH, Wis. Dan Whealy has acquired Heartland Video Systems and will be its new owner and president, the systems integrator said....
03/07/2025
Acclaimed filmmaker, educator, and industry veteran Jay Holben has released his most ambitious work to date: The Director's Guide to Everything a sweeping...
03/07/2025
For Los Angeles-based photographer Scout Pruski, documenting the annual Dyke Day LA is a way to honor and give back to the city's legacy queer community and...
03/07/2025
Modular, Travel-Ready Solution Matthews Studio Equipment launches the new Chimera V-Flat Panel Frame Kit, the lightweight and modular, ultra-durable alternativ...
03/07/2025
Dalet, a leading technology and service provider for media-rich organizations, today announced the release of Dalet Flex 2025.6 LTS (long-term support), introdu...
03/07/2025
Lightware's LARA Wizard makes it quicker and easier than ever to set up audio-visual (AV) room automation and control configurations, ensuring anyone, from ...
03/07/2025
Alfalite, the only European manufacturer of LED screens, has obtained both the NCAGE Code (NATO Commercial and Government Entity) and TAA (Trade Agreements Act)...
03/07/2025
nxtedition is implementing a new solution for WIN Network, based in its headquarters in Wollongong, New South Wales, Australia. The nxtedition integrated platfo...
03/07/2025
ORS Group and Insys Video Technologies today announce the launch of a new joint brand identity: Big Blue Marble. The move reflects the evolution of a long-stand...
03/07/2025
Evergent, a global leader in customer lifecycle management and monetization solutions for subscription-based businesses, today announced the successful results ...
03/07/2025
LYNX Technik, provider of modular signal processing solutions today announces an executive leadership transition, effective July 1, 2025. Markus Motzko has been...
03/07/2025
Chaos Releases V-Ray for Blender
Brie Clayton July 2, 2025
0 Comments
Production-Proven Renderer V-Ray Arrives Natively in Blender for the First Time;...
03/07/2025
Calvin University Adds Blackmagic Replay to Broadcasts and Streams
Brie Clayton July 2, 2025
0 Comments
Replay workflow joins 14 Blackmagic Design cam...
03/07/2025
Berklee's Gospel Performance Program Welcomes Jonathan Nelson as the Herb Al...
03/07/2025
In today's fragmented media landscape, advertisers expect more than just reach - they want seamless cross-platform campaigns that deliver measurable results...
03/07/2025
** MEDIA ALERT ** Shonen Jump Store Hosting Los Angeles Pop-up During Anime Exp...
03/07/2025
Thursday 3 July 2025
David Harewood and Matthew Broome in Mozart: Genius for Hi...
03/07/2025
The Sky WNT Fund supports Womens National Team players with a 30,000 bursaryThursday 3 July 2025
Sky Ireland has announced the four recipients of the 2025 Sky...
03/07/2025
The forecast this month is showing a 100% chance of epic gaming. Catch the scorching lineup of 20 titles coming to the cloud, which gamers can play whether indo...
02/07/2025
Hege Wik and Odin appear in FOLKTALES by Heidi Ewing and Rachel Grady, an official selection of the 2025 Sundance Film Festival. Courtesy of Sundance Institut...
02/07/2025
(Stephen Lovekin/Shutterstock for Sundance Film Festival)
By Patty Consolazio
This one's for any person who's ever felt put down, left out, marginaliz...
02/07/2025
Calrec expands ecosystem at NAB 2025 giving broadcasters access to dynamic workflows and ultimate flexibility Helping broadcasters meet the shifting needs of me...
02/07/2025
NEW YORK Paramount Global has agreed to pay $16 million to settle a lawsuit by President Donald Trump, ending a long-running legal saga that could clear the way...
02/07/2025
WASHINGTON The Federal Communications Commission has approved the transfer of licenses for five TV stations from Sinclair to Rincon Broadcasting, which announce...
02/07/2025
As the media industry faces an uncertain business climate and rapidly changing consumer habits, TV Tech's most popular stories from the first six months of ...
02/07/2025
PORTSMOUTH, N.H. New data shows that U.S. homes now own an average of two smart TVs, with Samsung and LG dominating the market but Roku and FireTV continue to g...
02/07/2025
LOS ANGELES Funds managed by Oaktree Capital Management have acquired FilmRise, an independent digital streaming content distributor, and merged it with Shout! ...
02/07/2025
WASHINGTON The Advanced Television Systems Committee named Luiz Fausto vice president of standards development, succeeding ATSC vice president Jerry Whitaker, w...
02/07/2025
Boston Conservatory and the Sphinx Organization Join Forces to Make Classical Ed...
02/07/2025
NEW AMSTERDAM CREATOR DAVID SCHULNER JOINS CREATIVE TEAM OF NEW FOX DRAMA SERIE...