Data-in-Use Protection: Privacy-Enhancing Technologies (PETs) for Business


Posted on in Presentations

Data-in-transit (on the network) and data-at-rest (in storage) has been protected for decades, but what about data-in-use? A variety of technologies (PETs) now provide ways to protect applications and data in RAM. Let's discuss what they are, how you have used them, and how they fit into the regulatory landscape. Most important: what do they do to your risk posture?
Recommended Reading Available in Our Bookstore

Trust in Computer Systems and the Cloud by Mike Bursell

Participants
Mike Bursell

Facilitator

Executive Director, Confidential Computing Consortium


Share With Your Community