What is confidential computing? Explained for 2024
How can you protect your data with Confidential Compute and Containers? Ashish spoke to Zvonko Kaiser, Principal Systems Software Engineer, Confidential Containers and Kubernetes at Nvidia about confidential containers, confidential computing, and their importance in protecting sensitive data. They speak about the various threat models, use cases, and the role of GPUs in enhancing compute power for AI workloads
Questions asked:
00:00 Introduction
01:45 A word from our sponsor SentinelOne
02:18 A bit about Zvonko
02:24 Encryption for Confidential Computing
04:20 Confidential Computing vs Confidential Containers
05:45 What sectors focus on Confidential Computing?
07:09 Common Threats in Confidential Computing
08:55 What is a Secure Enclave?
10:05 Value of Attestation for Confidential Computing
11:35 Lift and Shift Strategy for AI
13:59 The role of GPU in confidential Computing
15:37 Shared Responsibility with Confidential Computing
17:10 Confidential Computing project you can get invold in
18:16 The fun section
--------------------------------------------------------------------------------
📱Cloud Security Podcast Social Media📱
_____________________________________
🛜 Website: https://cloudsecuritypodcast.tv/
🧑🏾💻 Cloud Security Bootcamp - https://www.cloudsecuritybootcamp.com/
✉️ Cloud Security Newsletter - https://www.cloudsecuritynewsletter.com/
Twitter: https://twitter.com/CloudSecPod
LinkedIn: https://www.linkedin.com/company/Cloud-security-podcast
#cloudsecurity #nvidia #aisecurity
How can you protect your data with Confidential Compute and Containers? Ashish spoke to Zvonko Kaiser, Principal Systems Software Engineer, Confidential Containers and Kubernetes at Nvidia about confidential containers, confidential computing, and their importance in protecting sensitive data. They speak about the various threat models, use cases, and the role of GPUs in enhancing compute power for AI workloads
Questions asked:
00:00 Introduction
01:45 A word from our sponsor SentinelOne
02:18 A bit about Zvonko
02:24 Encryption for Confidential Computing
04:20 Confidential Computing vs Confidential Containers
05:45 What sectors focus on Confidential Computing?
07:09 Common Threats in Confidential Computing
08:55 What is a Secure Enclave?
10:05 Value of Attestation for Confidential Computing
11:35 Lift and Shift Strategy for AI
13:59 The role of GPU in confidential Computing
15:37 Shared Responsibility with Confidential Computing
17:10 Confidential Computing project you can get invold in
18:16 The fun section
——————————————————————————–
📱Cloud Security Podcast Social Media📱
_____________________________________
🛜 Website: https://cloudsecuritypodcast.tv/
🧑🏾💻 Cloud Security Bootcamp – https://www.cloudsecuritybootcamp.com/
✉️ Cloud Security Newsletter – https://www.cloudsecuritynewsletter.com/
Twitter: https://twitter.com/CloudSecPod
LinkedIn: https://www.linkedin.com/company/Cloud-security-podcast
#cloudsecurity #nvidia #aisecurity