Confidential Computing – Safeguarding Data While In Use

Confidential computing takeaways and learnings

The average time it takes to detect a data breach is 280 days. Most organisations struggle to keep track of their data. We need to put data governance frameworks in place to know where our data is, where it is going and who is accountable. This is a challenge with datasets moving from on-premise to cloud and edge computing environments and beyond the organisational boundaries. Cyber-attacks generally target data in use, exposing encrypted data in storage and transit. We should start there.




CIO WaterCooler Research

CIO WaterCooler Research specialises in delivering primary research from the CIOs perspective.

Left Menu Icon