Moritz EckertReproducible Builds for Confidential ComputingClosing the Gaps in Supply Chain Security6 min read·Jul 27, 2023----
Moritz EckertBring your own key (BYOK) was a lie!Bring your own key (BYOK) is a popular term used by cloud service providers (CSPs) when it comes to cloud security features.4 min read·Oct 13, 2022--2--2
Moritz EckertDeploying and managing data-centric confidential applications in the cloud with EdgelessDB and…A tutorial to easily get started with data-centric confidential computing applications.4 min read·Sep 22, 2021----
Moritz EckertConfidential multi-stakeholder AITo run AI workloads at scale, enterprises are increasingly relying on the public cloud. In this context, data security and privacy can…4 min read·Jul 21, 2021--1--1
Moritz EckertMarblerun now supports Graphene — and thus your favorite programming languageIn our previous blog posts, we introduced Marblerun — the service mesh for confidential computing.4 min read·Apr 1, 2021----
Moritz EckertHow to deploy SGX apps on Kubernetes [mini tutorial]Secure enclaves and Confidential Computing (CC) are the talk of the town — at least in the cloud-security community. Intel’s SGX…2 min read·Mar 3, 2021--1--1