AMD and Nvidia agree on the need for this vital new technology

, and seven other companies have announced their affiliation with the Confidential Computing Consortium (CCC), a group dedicated to standardizing data encryption techniques in the name of improved data privacy.

The syndicate was founded last year by a selection of behemoths IndustryMicrosoft, Intel, Tencent, Google Cloud, Oracle and more Industry‘confidential computing’.

Alongside AMD and Nvidia, the other new members include Accenture, Anjuna, Enclave, Cosmian, iExec, IoTeX and R3.

“In the past five months, we’ve added ten new members including a preeminent consultancy, a leading semiconductor manufacturer, and a pioneer in graphics processing,” said Stephen Walli, Governing Board Chair, Confidential Computing Consortium.

“This is a brilliant group of innovative companies that has come together to solve one of the key challenges in information security; protecting applications and data while in use,” he added.

Confidential Computing Consortium

The CCC’s ambition is to establish a universal system whereby data is encrypted while in use, as well as while at rest in storage and in transit Industryarmor.

To achieve this objective, the CCC hopes to expedite the shift toward a ‘confidential computing’ model Industrymulti-party computing, federated learning or privacy-preserving analytics.

These terms might sound vague Industry Industryenough: to ensure data remains secure, computation should be performed in specific hardware-based locations called Trusted Execution Environments (TEEs), away from prying eyes.

TEEs are isolated from the rest of the device, meaning code can be executed and data processed without fear of compromise or of threats posed by flawed software held on-device.

“These secure and isolated environments prevent unauthorized access or modification of applications and data while in use, thereby increasing the security assurances for organizations that manage sensitive and regulated data,” explained the CCC.

“Confidential computing can unlock the power of sensitive data by enabling collaboration while preserving privacy and compliance.”

You might also like More from author

Comments are closed.