Confidential cloud storage with Ceph combines distributed architecture, hardware-backed security, and OpenStack orchestration to protect sensitive data at scale. Learn how OpenMetal delivers secure storage for regulated industries. The post Confidential Cloud Storage with Ceph: Securing Sensitive Data at Scale appeared first on OpenMetal IaaS.| OpenMetal IaaS
In Today’s Issue Welcome to our latest newsletter! The May 2025 CCC newsletter spotlights growing momentum in Confidential Computing through key updates from RSA Conference, outreach activities, and technical advancements...| Confidential Computing Consortium
EQTY Lab, a pioneering startup dedicated to securing the future of artificial intelligence, is joining the Confidential Computing Consortium (CCC) as a Startup Member. Known for its innovative work in cryptographic AI governance, EQTY Lab has developed technologies that bring integrity, transparency, and accountability to high-stakes AI deployments across sectors like the public sector, life sciences, and media.| confidentialcomputing.io
This year’s Linaro Connect conference in Lisbon promises to be a landmark event for the confidential computing community. With multiple talks, workshops, and roundtables focused on trusted execution environments, attestation, and supply chain trust, confidential computing has emerged as an important theme of the 2025 conference.| confidentialcomputing.io
Confidential computing practical deployment doesn’t have to be hard. Learn how OpenMetal simplifies it with bare metal and secure networking| OpenMetal IaaS
The post Laying the Groundwork for 2025: Sylabs’ Vision for Secure Multi-Cloud Solutions appeared first on Sylabs.| Sylabs
The post Creating New Levels of Security with Containers and Confidential Computing appeared first on Sylabs.| Sylabs
Witnesses verify that the verifiable logs they are observing maintain their append-only property and countersign verified checkpoints. Clients can use these countersigned checkpoints to protect themselves against split-views, an attack where a log pr...| Transparency.dev Community Blog
Technologies, when combined, sometimes yield fascinating – and commercially exciting – results.| Alice, Eve and Bob - a security blog
What does an Executive Director do?| Alice, Eve and Bob – a security blog
Trying sd-boot and unified kernel images in a KVM virtual machine| www.berrange.com