Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting our team. We will be in touch shortly.Close

  1. Blog
  2. ijlal-loutfi

ijlal-loutfi

ijlal-loutfi

22 posts


ijlal-loutfi
8 July 2024

Deploy confidential computing with Intel® TDX and Ubuntu 24.04 today

Confidential computing Confidential computing

Discover how to deploy confidential computing with Intel® Trust Domain Extensions (Intel® TDX) on Ubuntu 24.04 LTS. Enhance your data security with simplified VM isolation, protecting sensitive data in system memory effortlessly. ...


ijlal-loutfi
21 February 2024

Preview Confidential AI with Ubuntu Confidential VMs and NVIDIA H100 GPUs on Microsoft Azure

Confidential computing Confidential computing

Learn about Confidential AI preview on Azure with Ubuntu confidental VMs and Nvidia H100 GPUs, and explore how confidential computing in the cloud transforms AI security, ensuring utmost confidentiality and integrity for sensitive data and models. ...


ijlal-loutfi
19 December 2023

Ubuntu Confidential VMs on Azure: Introducing Ephemeral OS disks & vTPMs

Confidential computing Confidential computing

Canonical introduces ephemeral vTPMs for Ubuntu Confidential VMs on Azure, Strengthening remote attestation. Explore the evolution of confidential computing, the pivotal role of vTPMs, and Ubuntu’s solution that minimizes reliance on cloud infrastructure while ensuring comprehensive security within your VM’s software stack.” ...


ijlal-loutfi
12 December 2023

Ubuntu confidential VMs with Intel® TDX are now in public preview on Azure

Confidential computing Confidential computing

Discover the enhanced security of Ubuntu Confidential VMs on Azure. With Intel TDX technology which encrypt your workloads at run time. Explore the public preview today and experience a new level of cloud security ...


ijlal-loutfi
3 November 2023

Intel® TDX 1.0 technology preview available on Ubuntu 23.10

Confidential computing Confidential computing

Today’s security landscape faces a significant challenge: the lack of adequate protection for data in active use. Data breaches can happen at runtime (that is, when computation is taking place on a machine’s main memory), stemming from a range of vectors such as malicious insiders with elevated privileges or hackers exploiting vulnerabili ...


ijlal-loutfi
9 October 2023

Restricted unprivileged user namespaces are coming to Ubuntu 23.10

Security Confidential computing

Ubuntu Desktop firmly places security at the forefront, and adheres to the principles of security by default. This approach caters to both everyday users and organisations with specific compliance requirements. As such, Ubuntu ensures that its recommended security configurations are equally robust, easy to understand and readily accessibl ...


ijlal-loutfi
7 September 2023

TPM-backed Full Disk Encryption is coming to Ubuntu

Confidential computing Confidential computing

Discover Ubuntu’s latest security enhancement: TPM-backed Full Disk Encryption (FDE). This experimental feature in Ubuntu 23.10 offers improved data protection without the need for passphrases ...


ijlal-loutfi
24 July 2023

Why do you also need confidential computing for your private datacenter?

Confidential computing Confidential computing

Confidential computing is not limited to public cloud environments; it also has significant value in private data centers. While private data centers offer data governance, control, and physical security, they are still vulnerable to insider attacks and share the same system software vulnerabilities as public cloud environments. By adopti ...


ijlal-loutfi
11 July 2023

Why you need to protect your confidential virtual machine from itself

Confidential computing Confidential computing

Confidential computing disrupts the traditional threat model by decoupling resource management from data access. It introduces new CPU security extensions like AMD SEV and Intel TDX, providing memory isolation through encryption and hardware access control mechanisms. While confidential computing protects against external threats, it’s im ...


ijlal-loutfi
29 June 2023

The founding moments: Tracing the origins of confidential computing

Confidential computing Confidential computing

In Ernest Hemingway’s novel “The Sun Also Rises,” there is a memorable exchange between the author and the main character, Mike. When asked how he went bankrupt, Mike responds with a concise yet profound answer: “Two ways. Gradually, then suddenly.”  Innovation happens much in the same way. Gradually, then suddenly. Ideas simmer and evolv ...


ijlal-loutfi
28 June 2023

Strengthen your cloud cyber security with Ubuntu Pro and confidential VMs

Ubuntu Confidential computing

Strengthen your cloud cyber security with Ubuntu Pro and confidential VMs. This blog dives into the crucial role your OS plays in cloud security and highlights the extensive security measures offered by Ubuntu, including the game-changing confidential computing technology. ...


ijlal-loutfi
17 June 2023

Is Linux secure?

Confidential computing Security

Operating system security is the upper bound of your application security Meet Pal. Pal is a senior developer working at PalBank. For the next 6 months, Pal will be responsible for leading the development of the bank’s web application client, which will be used daily by millions of customers. Pal invests considerable effort into designing ...


  1. Previous page
  2. 1
  3. 2
  4. Next page