Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting our team. We will be in touch shortly.Close

Blog posts tagged
"confidential VM"


ijlal-loutfi
31 October 2022

Confidential computing in public clouds: isolation and remote attestation explained

Confidential computing Confidential computing

In the first part of this blog series, we discussed the run-time (in)security challenge, which can leave your code and data vulnerable to attacks by both the privileged system software of the public cloud infrastructure, as well as its administrators. We also introduced the concept of trusted execution environments and confidential comput ...


ijlal-loutfi
11 October 2022

What is confidential computing? A high-level explanation for CISOs

Confidential computing Confidential computing

Privacy enhancing technologies and confidential computing are two of my favorite topics to talk about! So much so that I am writing this blog post on a sunny Saturday afternoon. But wait, what’s that I hear you murmuring? “What is confidential computing? And how does it affect me?” Those are two very good questions.  Before ...


ijlal-loutfi
28 July 2022

Let’s get confidential! Canonical Ubuntu Confidential VMs are now generally available on Microsoft Azure

Confidential computing Confidential computing

On behalf of all Canonical teams, I am happy to announce the general availability of Ubuntu Confidential VMs (CVMs) on Microsoft Azure! They  are part of the Microsoft Azure DCasv5/ECasv5 series, and only take a few clicks to enable and use. Ubuntu 20.04 is the first and only Linux distribution to support Confidential VMs on ...


Nikos Mavrogiannopoulos
16 December 2021

How we designed Ubuntu Pro for Confidential Computing on Azure

Confidential computing Confidential computing

Not all data is destined to be public. Moving workloads that handle secret or private data from an on-premise setup to a public cloud introduces a new attack surface with different risks. As the public cloud environment shares its hardware infrastructure, a flaw in the clouds’ isolation mechanisms can be detrimental to the protection of ...


  1. Previous page
  2. 1
  3. 2
  4. Next page