Moritz EckertReproducible Builds for Confidential ComputingClosing the Gaps in Supply Chain SecurityJul 27, 2023Jul 27, 2023
Moritz EckertBring your own key (BYOK) was a lie!Bring your own key (BYOK) is a popular term used by cloud service providers (CSPs) when it comes to cloud security features.Oct 13, 20222Oct 13, 20222
Moritz EckertDeploying and managing data-centric confidential applications in the cloud with EdgelessDB and…A tutorial to easily get started with data-centric confidential computing applications.Sep 22, 2021Sep 22, 2021
Moritz EckertConfidential multi-stakeholder AITo run AI workloads at scale, enterprises are increasingly relying on the public cloud. In this context, data security and privacy can…Jul 21, 20211Jul 21, 20211
Moritz EckertMarblerun now supports Graphene — and thus your favorite programming languageIn our previous blog posts, we introduced Marblerun — the service mesh for confidential computing.Apr 1, 2021Apr 1, 2021
Moritz EckertHow to deploy SGX apps on Kubernetes [mini tutorial]Secure enclaves and Confidential Computing (CC) are the talk of the town — at least in the cloud-security community. Intel’s SGX…Mar 3, 20211Mar 3, 20211