Azure Confidential VM’s Deep Dive

Introduction In a couple of my previous posts on related technologies, I explored Securing Data in Use Using Confidential Computing and Confidential Computing Implementation Methodologies. In this post, we’ll be focusing on Azure Cloud Platform’s Confidential Computing Virtual Machines and their advantages. Tenants that have stringent needs for...
Continue reading »

Confidential Computing Implementation Methodologies

Introduction Azure’s secure computing provides a variety of alternatives for developing confidential solutions. The spectrum of options varies from allowing “lift and shift” situations for current applications to providing complete control over several security elements. These features include control over the level of access. Options Available for Confidential...
Continue reading »

  • Disclaimer

    The views and opinions expressed on this blog are my own and does not reflect the views and opinions of my employer.