Jump to content
  • Sign Up
×
×
  • Create New...

Securing data in GCP: A Computer Weekly Downtime Upload podcast


Recommended Posts

  • Diamond Member

This is the hidden content, please

Securing data in GCP: A Computer Weekly Downtime Upload podcast

data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///ywAAAAAAQABAAACAUwAOw==
Listen to this podcast

We speak to

This is the hidden content, please
’s director of product management for confidential computing about ensuring the protection of data in use

How do you offer a trusted environment for hosting applications and data in the public cloud? It is an area

This is the hidden content, please
’s Nelly Porter is very much focused on. Porter is a director of product management at
This is the hidden content, please
, with responsibilities covering GCP (
This is the hidden content, please
Cloud) confidential computing and encryption.

Confidential computing is among the techniques GCP uses to secure data, as Porter explains: “Confidential computing is a very interesting term and it’s come from the concept of computing. When you’re performing operations on data using an application, confidential computing points to the fact that there are a bunch of technologies built to protect customers’ and users’ privacy. It’s privacy preserving technology that is helping to keep data and workloads protected when in use such as when an application performs any operations on that data. This means it has to process it. It has to put it in memory and it has to run computational operations on that data by utilising hardware like CPUs, GPUs or TPUs [tensor processing units] or any other device.”

It is based on hardware controls built into

This is the hidden content, please
’s infrastructure security. “We’re using the hardware capabilities of our partners like AMD, Intel, or Nvidia to establish very strong cryptographic isolation and protection for our customers’ workloads,” she adds.

The goal is to ensure customers are actually running their applications in confidential hardware based environments.

To provide this security, she says

This is the hidden content, please
needs to make sure AMD, Intel, Nvidia and other hardware providers are doing what they need to do to ensure security is maintained in their products. Equally,
This is the hidden content, please
Cloud has to play its part in securing its cloud infrastructure. “All of these companies have come together to offer incredibly usable, scalable and performant confidential computing for our customers,” she says.



This is the hidden content, please

#Securing #data #GCP #Computer #Weekly #Downtime #Upload #podcast

This is the hidden content, please

This is the hidden content, please

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.