YoVDO

Confidential Containers: Why, How, and Where Are We?

Offered By: Linux Foundation via YouTube

Tags

Confidential Computing Courses Cybersecurity Courses Cloud Computing Courses Data Protection Courses Cloud Security Courses Containerization Courses Container Security Courses Data Sovereignty Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of Confidential Computing and its application to container technology in this informative conference talk. Learn about the challenges of data sovereignty in cloud environments and how Confidential Computing addresses the vulnerability of data in-use. Discover the Confidential Containers (CoCo) project, a CNCF initiative aimed at democratizing Confidential Computing by enabling easy deployment of existing containers into secure environments. Gain insights into the principles of Confidential Computing, its compatibility with container technology, and the architecture and technical challenges of the CoCo project. Understand how this technology can potentially revolutionize cloud security and enable sensitive workloads to be run with greater confidence in cloud environments.

Syllabus

Confidential Containers: Why, How, and Where Are We? - Magnus Kulke, Microsoft


Taught by

Linux Foundation

Tags

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube