Author: Ido Helshtock

COP 26 Glasgow
Confidential Computing

The Energy Efficiency of Confidential Computing

With COP26 Glasgow taking place today, here are some thoughts on confidential computing and environmental concerns.

With cloud computing being in high demand, companies are competing on resources of electricity, space, and ventilation. This is happening as the demand for better performance is constantly on the rise, heavy processing is taking place, and algorithmic needs are ever-changing.

On an environmental level – this all translates to high levels of energy consumption, which causes carbon emission.

Read More »
colonial pipeline
critical infrastructure security

What We Can Learn in the Aftermath of the Colonial Pipeline Hack

The Colonial Pipeline reportedly paid hackers a ransom of $4.4 million in bitcoin soon after discovering the attack on its systems which began May 6th. In addition, the hackers also stole nearly 100 gigabytes of data from Colonial Pipeline and subsequently threatened to leak it in one of the most high-profile ransomware attacks of the last decade.

Read More »
Secured chip
Artificial Intelligence

Artificial Intelligence and Confidential Computing

Confidential computing is secure computing technology that is designed to ensure that sensitive data in use remains safe, confidential, and accessible to authorized users. Confidential computing eliminates the remaining vulnerabilities created by loosely-defined security protocols, weak perimeter filtering, and inadequate isolation tactics, by protecting data when it is processed in an external and non-secure environment

Read More »
Secure remote voting

The Pathway to Secure Remote Voting

In fact, blockchain voting has already been creating waves and changing elections. Overseas military from West Virginia, USA for example can already vote in their local elections using just their mobile phones. A combination of encryption and blockchain registry then tallies their votes.

Read More »