{"id":315,"date":"2019-08-27T08:49:03","date_gmt":"2019-08-27T03:19:03","guid":{"rendered":"https:\/\/www.hostnamaste.com\/blog\/?post_type=news&#038;p=315"},"modified":"2019-10-23T18:34:03","modified_gmt":"2019-10-23T13:04:03","slug":"microsoft-and-9-more-tech-firms-team-up-to-accelerate-confidential-computing-adoption","status":"publish","type":"news","link":"https:\/\/www.hostnamaste.com\/blog\/news\/microsoft-and-9-more-tech-firms-team-up-to-accelerate-confidential-computing-adoption\/","title":{"rendered":"Google, Alibaba, Microsoft, Baidu, and More Technical Firms Team Up to Back Confidential Computing Consortium"},"content":{"rendered":"<figure id=\"attachment_317\" aria-describedby=\"caption-attachment-317\" style=\"width: 820px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-317\" src=\"https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2019\/08\/Confidential-Computing-Consortium-HostNamaste.jpg\" alt=\"Google, Alibaba, Microsoft, Baidu, IBM, Intel, Red Hat and More Technical Firms Team Up to Accelerate and Back Confidential Computing Consortium to Protect Data In Use - HostNamaste\" width=\"820\" height=\"512\" srcset=\"https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2019\/08\/Confidential-Computing-Consortium-HostNamaste.jpg 820w, https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2019\/08\/Confidential-Computing-Consortium-HostNamaste-300x187.jpg 300w, https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2019\/08\/Confidential-Computing-Consortium-HostNamaste-768x480.jpg 768w\" sizes=\"auto, (max-width: 820px) 100vw, 820px\" \/><figcaption id=\"caption-attachment-317\" class=\"wp-caption-text\"><span style=\"font-size: 12pt; font-family: Verdana, Geneva; color: #5dae26;\">Google, Alibaba, Microsoft, Baidu, IBM, Intel, Red Hat and More Technical Firms Team Up to Accelerate and Back Confidential Computing Consortium to Protect Data In Use &#8211; HostNamaste<\/span><\/figcaption><\/figure>\n<p><span style=\"font-size: 12pt; font-family: Verdana, Geneva;\">Alibaba, Baidu, Google Cloud, IBM, Intel, Red Hat, Microsoft and four other companies have formed a group to ensure the <a href=\"https:\/\/www.hostnamaste.com\/blog\/how-to-stay-secure-from-cyber-attacks\/\">secure<\/a> processing of data while it&#8217;s in use.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: Verdana, Geneva;\">The\u00a0<a href=\"https:\/\/confidentialcomputing.io\/\" target=\"_blank\" rel=\"noopener\">Confidential Computing Consortium<\/a>\u00a0aims to help define and accelerate open-source technology that keeps data in use <a href=\"https:\/\/www.yourlasthost.com\/blog\/how-a-good-web-host-keeps-website-secure\/\" target=\"_blank\" rel=\"noopener\">secure<\/a>. Data typically gets encrypted by service providers, but not when it\u2019s in use. This consortium will focus on encrypting and processing the data \u201cin memory\u201d to reduce the exposure of the data to the rest of the system. It aims to provide greater control and transparency for users.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: Verdana, Geneva;\">Now that more companies are moving toward cloud computing, the need for this type of technology becomes increasingly important.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: Verdana, Geneva;\">\u201cProtecting data in use means data is provably not visible in unencrypted form during computation except to the code authorized to access it,\u201d wrote Mark Russinovich, CTO of Microsoft Azure, in a blog post. \u201cThat can mean it\u2019s not even accessible to public cloud service providers or edge device vendors. This capability enables new solutions where data is private all the way from the edge to the public cloud.\u201d<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: Verdana, Geneva;\"><a href=\"https:\/\/www.linuxfoundation.org\/press-release\/2019\/08\/new-cross-industry-effort-to-advance-computational-trust-and-security-for-next-generation-cloud-and-edge-computing\/\" target=\"_blank\" rel=\"noopener\">The Linux Foundation<\/a>\u00a0will host the Consortium. The companies will collaborate on open-source technologies and standards that accelerate the adoption of confidential computing. <a href=\"https:\/\/www.mediapost.com\/publications\/article\/339593\/alibaba-baidu-google-microsoft-others-back-con.html?edition=115048\" target=\"_blank\" rel=\"noopener\">READ MORE HERE<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alibaba, Baidu, Google Cloud, IBM, Intel, Red Hat, Microsoft and four other companies have formed a group to ensure the secure processing of data while&hellip;<\/p>\n","protected":false},"author":2,"featured_media":317,"comment_status":"open","ping_status":"closed","template":"","tags":[481,482,487,480,483,388,488,490],"news-category":[479,396,489],"class_list":["post-315","news","type-news","status-publish","has-post-thumbnail","hentry","tag-alibaba","tag-baidu","tag-confidential-computing-consortium","tag-google","tag-google-cloud","tag-microsoft","tag-protecting-data","tag-the-linux-foundation","news-category-confidential-computing-consortium","news-category-microsoft","news-category-the-linux-foundation"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/news\/315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/comments?post=315"}],"version-history":[{"count":0,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/news\/315\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/media\/317"}],"wp:attachment":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/media?parent=315"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/tags?post=315"},{"taxonomy":"news-category","embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/news-category?post=315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}