Intel sets focus on innovative security technologies

Intel recently hosted a file Innovation Conference in San Jose. Innovation focuses on the developer community and provides an opportunity for attendees to learn about the latest technologies and innovative computing solutions. The event also showcased the value Intel places on security and empowering developers and customers with advanced hardware and software solutions that raise the bar for security.

Day 2 keynote speaker Greg Lavender provided an update about Project Intel Amber Initiative. Intel made its way into clandestine computing and was engineered Software Security Extensions (SGX) To facilitate secure computing. Organizations need to be able to create a Trusted Execution Environment (TEE) across cloud platforms, SaaS applications, and other external environments, though, and Project Amber was developed to provide an independent third-party trust authority.

Intel Security Chalk Talk

In conjunction with Intel Innovation, Intel also conducted a Chalk Talk session with media. Anil Rao, Vice President & General Manager Systems Engineering & Intel engineering and Amy SantoniThe Intel Fellow program identified Intel’s security projects and priorities and answered questions from the audience.

Anil started the Chalk Talk session by outlining the four primary areas that Intel focuses on when it comes to security. First, he emphasized that security is a mindset and that it is important for every engineer in the company and every engineer in partner organizations to understand that they need to think about security from a mental perspective. The other three pillars of security are technology – and engineering of secure technologies, assurance and transparency – which addresses how the company reacts to security incidents, solves open issues, and finally protects Intel itself. Anil noted that Intel is a big company and a high-level target, and that it is imperative that Intel adopt best security practices and continue to raise the bar for security.

Provide an overview of the secret account. Organizations have had data protection at rest and data in transit for some time now, but Anil noted that the threat landscape has changed and that is no longer good enough. Things like internal attacks, memory attacks, and privilege escalation attacks mean that we must also protect data while it is being used. “Confidential computing was invented as a technology to address the last mile problem with data encryption and data protection,” Anil explained.

Amy discussed the limits of trust and described how the Trusted Execution Environment (TEE) differs from the standard virtual environment from a cloud service provider. It also demonstrated Flow Control Technology (CET) – which is supported in 4th generation Xeon Scalable processors. “There are certain attacks that when you make a call, jump, or return, while you are jumping inside your code, they will protect against this class of attacks.”

Focus on security

Lots of companies focus on security, but few are able to impact the security equation as strongly as Intel. As I wrote in 2020 when I was the first time Covering the concept of CETMalware will continue to exist. Developers will continue to create applications with vulnerabilities and vulnerabilities for attackers to exploit. Cybercriminals will continue to develop innovative solutions and new exploits to continue the cat-and-mouse game of cybersecurity. These applications run on devices, though, making It puts Intel in a very strong position to help address the issue.”

CET, SGX, Confidential Compute with TEEs, and now the addition of “Project Amber” as an independent third-party trust body, are evidence of Intel’s continued commitment to security. Through both hardware and software initiatives, Intel remains focused on creating solutions that improve computing confidence, while increasing the cost of entry for threat actors and making successful attacks more difficult to implement.

Latest posts by Tony Bradley (show all)

Leave a Comment