Formerly known as Project Amber, Intel’s attestation services support confidential computing deployments.
The enhancements are designed to better protect sensitive data, harden admin access controls, and provide more flexibility on where data is stored and processed.
Young vendors of identity and access management, application security, and third-party risk solutions dominate the list of startups exhibiting at RSA.
In what the chipmaker claims is an industry first, the latest processor line from Intel will incorporate threat detection right into the hardware, bolstering EDR and other cybersecurity platforms.
The compromise of SolarWinds' Orion software changed the company's approach to security. Tim Brown shares some hard-won advice for how CISOs and software vendors should prepare for supply chain attacks.
Bad news: Ransomware becomes a bigger threat, and it becomes harder to find security talent. Good news: CISOs gain clout, and security infrastructure will improve.
The way organizations assess and respond to security risks will likely never be the same due to COVID, say respondents of a new IDG survey.
Reports show big differences in risk among public, private and hybrid cloud deployments. Here’s advice on the tools, information and organizational structure needed to execute a successful cloud security strategy.
Sponsored Links