Confidential Computing – Safeguarding Data While In Use
The average time it takes to detect a data breach is 280 days. Most organisations struggle to keep track of their data. We need to put data governance frameworks in place to know where our data is, where it is going and who is accountable. This is a challenge with datasets moving from on-premise to cloud and edge computing environments and beyond the organisational boundaries. Cyber-attacks generally target data in use, exposing encrypted data in storage and transit. We should start there.