<p>This article is the first in a six-part series in which we present various usage models for <strong>confidential computing</strong>, a set of technologies designed to protect data in use—for example by using memory encryption—and the requirements to get the expected security and trust benefits from the technology.</p>
<p>In the series, we will focus on four primary use cases: confidential <em><strong>virtual machines</strong></em>, confidential <e
This article has been indexed from Red Hat Security
Read the original article: