Please turn on your JavaScript for this page to function normally.
Confidential Computing Consortium

Confidential Computing Consortium unveils Gramine 1.0 to protect sensitive datasets at all stages
The Confidential Computing Consortium’s new Gramine Project is introducing its production-ready version – Gramine 1.0 – to enable protection of sensitive workloads with Intel …

Confidential computing market to reach $54 billion in 2026
The confidential computing market is projected to grow at a CAGR of 90%-95% to reach $54 billion in 2026, according to findings from a market study by Everest Group. …

What is confidential computing? How can you use it?
What is confidential computing? Can it strengthen enterprise security? Nelly Porter, Senior Product Manager, Google Cloud and Sam Lugani, Lead Security PMM, Google Workspace …

New cross-industry consortium aims to accelerate confidential computing adoption
The Linux Foundation announced the intent to form the Confidential Computing Consortium, a community dedicated to defining and accelerating the adoption of confidential …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility