Category: Confidential Computing

Artificial Intelligence

Cutting Edge

For the experienced reader, Edge computing should not be too hard to comprehend. In July 1969, Apollo 11 landed on the moon, in large part

Read More »
Valerii Babushkin, whatsapp privacy team
Artificial Intelligence

AI & Data Privacy with Valerii Babushkin

Towards our online summit on June 10th, AI and Data Privacy we set down for an interview with Valerii Babushkin, WhatsApp User Data Privacy Tech Lead, who will be joining the event.

Read More »
Security threats facing AI and ML
Artificial Intelligence

Top 5 Security Threats Facing Artificial Intelligence and Machine Learning

An emerging space within AI is the need to share and access more big data from semi trusting parties in order to achieve better models and insights. A good example is multiple healthcare providers sharing images and their interpretation in order to create an AI model to detect anomalies on its own. The more images the better algorithm. This scenario requires the model to access data from all healthcare providers, but assure that images cannot be accessed by each individual healthcare provider to another.

Read More »
secure building
Confidential Computing

Zero-Trust Confidential Computing for Legacy Systems

The HUB Vault is an ultra-secure hardware and software confidential computing platform designed to protect your most valuable legacy systems and applications. The programmable and customizable MultiCore confidential compute platform enables companies a simple, flexible, and scalable digital transformation to the cloud regardless of legacy model.

Read More »