#177 Zero Trust Data with SafeLiShare

During this episode, Darren and SafeLishare CEO Shamim Naqvi discuss how confidential computing can be employed to create managed data-sharing collaborative environments in the cloud. The SafelyShare Revolution in Data Sharing and Confidentiality Data sharing has always been a key issue when dealing with sensitive and confidential business information. The advanced technological solutions including SafelyShare have been tackling this problem, offering a controlled system for data access without violating data protection. The fundamental basis of this system is "Zero Trust", a unique strategy that doesn't assume trust for anyone and keeps control and monitoring at its core.  Harnessing the Power of Secure EnclavesA critical aspect of SafelyShare's approach is the use of secure enclaves, or trusted execution environments, ensuring a safe space for data sharing, authentication, and management. These enclaves are created with the help of specific confidential computing chipsets that fully enclose the shared data. With encryption practices implemented outside of these enclaves, data can only be decrypted once it enters the enclave, thereby providing an end-to-end encryption policy. The output exiting the enclave is also encrypted, adding another layer of security to protect the data.But challenges exist within this process. Not all online services incorporate a secure enclave in their operation, leading to a high demand for a more flexible, effective solution to confidential computing. The Hybrid Approach of Confidential ComputingTo address this issue, SafelyShare offers an approach that is best described as a hybrid model of confidential computing. To compensate for services that don't operate within secure enclaves, this methodology introduces the idea of 'witness execution.' In this scenario, the user places trust in the providers' guarantee of their competency and safe data handling. It's a kind of tacit agreement between the user and the remote service provider, making the confidential computing more feasible in the real world scenarios.This hybrid approach redefines the secure sharing paradigm in a world that's continuously evolving. With its elastic foundation, SafelyShare incorporates a profound understanding of the changing security parameters, making confidential computing adaptable and responsive to changing demands and realities. Conclusion: Revolutionizing Secure Data SharingIn essence, SafelyShare is the leading forerunner in the journey to making sensitive data sharing secure, efficient, and feasible. Navigating around traditional hurdles, it integrates hybrid confidential computing into its framework, achieving a unique blend of trust and practicality. The innovative approach of integrating witnessed computing into the process blurs the lines between full and partial trust, making data security more achievable and delivering a promising narrative for the future of data sharing and security.

Om Podcasten

Darren Pulsipher, Chief Solution Architect for Public Sector at Intel, investigates effective change leveraging people, process, and technology. Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution. People Workers are at the heart of many of today’s biggest digital transformation projects. Learn how to transform public sector work in an era of rapid disruption, including overcoming the security and scalability challenges of the remote work explosion. Processes Building an innovative IT organization in the public sector starts with developing the right processes to evolve your information management capabilities. Find out how to boost your organization to the next level of data-driven innovation. Technologies From the data center to the cloud, transforming public sector IT infrastructure depends on having the right technology solutions in place. Sift through confusing messages and conflicting technologies to find the true lasting drivers of value for IT organizations.