Confidential computing won’t save you from data breaches—but it can help

A Google exec and a Stevens Institute director lay out the potential and the pitfalls of this emerging cloud computing technology for data protection.

Data privacy and security is a minefield. A cybersecurity team can deploy layers of encryption, firewalls, and anti-malware to protect their organization, but a savvy hacker needs only one loosely defended entry point to wreak havoc.

With well-organized hacking groups able to take servers offline for days or even weeks—as seen at the end of January, when LockBit forced Ion Trading to shut down a key futures trading service using ransomware—privacy-enhancing technologies have been touted as a

Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.

To access these options, along with all other subscription benefits, please contact info@waterstechnology.com or view our subscription options here: http://subscriptions.waterstechnology.com/subscribe

You are currently unable to copy this content. Please contact info@waterstechnology.com to find out more.

Sorry, our subscription options are not loading right now

Please try again later. Get in touch with our customer services team if this issue persists.

New to Waterstechnology? View our subscription options

How GenAI could improve T+1 settlement

As well as reducing settlement failures, IBM researchers believe generative AI can provide investment managers with improved research, prioritization, and allocation resources.

Interoperability is not AI

Dan Schleifer, co-founder of Interop.io, explains how desktop interoperability underpins new AI developments.

You need to sign in to use this feature. If you don’t have a WatersTechnology account, please register for a trial.

Sign in
You are currently on corporate access.

To use this feature you will need an individual account. If you have one already please sign in.

Sign in.

Alternatively you can request an individual account here