Jul 14, 2021Confidential Computing: A tale about trustOnce upon a time, there was a General who was entrusted with maintaining the security of state secrets. In the same state, there also lived an Engineer, who was responsible for developing new technologies using the information controlled by the General. …Confidential Computing4 min read
Jun 30, 2021Zero Trust Architecture with Fortanix Enclave Development Platform (EDP)The most important principle in engineering any complex system is abstraction. In software engineering this is a very widely used mechanism. Programmers think in terms of services that are provided to them from a lower layer and services that they provide to a higher layer. Take the operating system as…Zero Trust Security4 min read
Jun 24, 2021Data Sovereignty and Privacy Compliance Post Schrems IIThe past year has had an unprecedented impact on business technology strategies as organizations scrambled to adapt to operating in the COVID-19 pandemic. However, there have also been some seismic shifts in the realm of data privacy and security. In July 2020, the Court of Justice of the European Union…Data Security4 min read
Jun 7, 2021Six Insights from the 2021 SANS Cloud Security Survey2021’s SANS Cloud Security Survey has been released and is an important read for security stakeholders within an organization. It is also worth tuning into the panel discussion recording that presented and analyzed the findings if you missed it live. In the panel discussion, Dave Shackleford, SANS analyst and CEO…Cloud Security7 min read
May 27, 20215 Best Practices for Enforcing Compliance in the Data-driven World of FinanceThe data driven world of finance How financial firms handle, and store finances and data are a far cry from what it used to be about a decade back. For example, in today’s competitive world banks need to be more data-driven than ever before. This is critical to acquire more customers and deliver the best experiences. …Data Compliance5 min read
May 18, 2021Solving the TPM key provisioning problem with Fortanix Data Security ManagerFor the last decade, smart devices have become increasingly integrated into our society. But as our reliance on these devices grows, so does the probability and potential impact of security breaches. In a move towards improving platform security, smart device manufacturers have started integrating Trusted Platform Modules (TPM) into their…Data Security7 min read
May 12, 202110 Key Management Best Practices You Should KnowThe amount of data that organizations handle is growing exponentially, and an increasing proportion of this data is sensitive in some way. …Key Management6 min read
May 6, 2021PII Data Security in a Hybrid and Multicloud WorldAny data that can be used by itself or in combination with other pieces of data to uniquely identify a specific individual is considered as Personally Identifiable Information (PII). Traditionally, some of the common examples that have been considered most sensitive PII data are Social Security numbers, mailing addresses, email…Pii8 min read
Apr 30, 2021Life At Fortanix with Julian WeinbergerThe tech industry is known for a lot of things when it comes to employment within it. Great salaries, amazing benefits, relaxed working atmospheres, cutting edge ideas, the works! Across the globe millions are clamoring to join in on the tech boom and find a career in the most fun…6 min read
Apr 28, 2021How will Intel’s “Ice Lake” redefine the scope of data security?On 6 April 2021, the data security world took a giant leap forward with the launch by Intel® of its 3rd Generation Intel® Xeon® Scalable Processors — code-named Ice Lake — for use in the next generation of server platforms. As expected, the new processors can handle a range of…Data Security5 min read