{"id":5452,"date":"2025-05-17T04:22:26","date_gmt":"2025-05-16T20:22:26","guid":{"rendered":"https:\/\/cicserver.com\/cios-move-to-secure-data-in-use\/"},"modified":"2025-05-17T04:22:26","modified_gmt":"2025-05-16T20:22:26","slug":"cios-move-to-secure-data-in-use","status":"publish","type":"post","link":"https:\/\/cicserver.com\/de\/cios-move-to-secure-data-in-use\/","title":{"rendered":"CIOs Move to Secure Data in Use"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div data-module=\"content\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">As cyber threats grow more sophisticated and data privacy regulations grow sharper teeth, chief CIOs are under increasing pressure to secure enterprise data at every stage \u2013 at rest, in motion, and now, increasingly, in use.\u00a0<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Confidential computing, a technology that protects data while it is being processed, is becoming an essential component of enterprise security strategies. While the promise is clear, the path to implementation is complex and demands strategic coordination across business, IT, and compliance teams.\u00a0<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Itai Schwartz, co-founder and CTO at Mind, explains that confidential computing enables secure data processing even in decentralized environments, which is particularly important for AI workloads and collaborative applications.\u00a0<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">\u201cRemote attestation capabilities further support a zero-trust approach by allowing systems to verify the integrity of workloads before granting access,\u201d he says via email.\u00a0<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link ContentText-BodyTextChunk_italic\" target=\"_blank\" href=\"https:\/\/www.informationweek.com\/it-leadership\/confidential-computing-cios-move-to-secure-data-in-use\">Keep reading this article in InformationWeek, a Data Center Knowledge partner site<\/a><\/span><\/p>\n<\/div>\n<p><script defer=\"\" async=\"\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&amp;version=v18.0\" data-ot-ignore=\"true\"><\/script><br \/>\n<br \/><\/p>","protected":false},"excerpt":{"rendered":"<p>As cyber threats grow more sophisticated and data privacy regulations grow sharper teeth, chief CIOs are under increasing pressure to secure enterprise data at every stage \u2013 at rest, in motion, and now, increasingly, in use.\u00a0 Confidential computing, a technology that protects data while it is being processed, is becoming an essential component of enterprise [&hellip;]<\/p>","protected":false},"author":3,"featured_media":5453,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-5452","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog"},"_links":{"self":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/comments?post=5452"}],"version-history":[{"count":0,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5452\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media\/5453"}],"wp:attachment":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media?parent=5452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/categories?post=5452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/tags?post=5452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}