Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    They’re Coming For Your Social Security

    April 25, 2026

    White House Allowed Officials’ Text Messages to Be Deleted, Lawsuit Says

    April 25, 2026

    How to Use Manuka Honey: A Comprehensive Practical Guide

    April 25, 2026
    Facebook X (Twitter) Instagram
    Trending
    • They’re Coming For Your Social Security
    • White House Allowed Officials’ Text Messages to Be Deleted, Lawsuit Says
    • How to Use Manuka Honey: A Comprehensive Practical Guide
    • The Most Common Issues Gen Xers Bring Up In Therapy
    • 37 Products To Help On Long Travel Days
    • The Peril of Piloting Ships Through the Strait of Hormuz
    • Marco Rubio Says Iran Team Welcome At World Cup, But With 1 Big Condition
    • 5 Chair Exercises For Abs
    Facebook X (Twitter)
    SBM Global News
    Demo
    • Home
    • Top Stories
      • Politics
    • Business
      • Small Business
      • Marketing
    • Finance
      • Investment
    • Technology

      Porsche is adding an all-electric Cayenne coupe to its lineup

      April 24, 2026
      Read More

      Jahid Babu Tech – Company Profile

      April 24, 2026
      Read More

      NASA’s Artemis II Moon mission shows space-to-Earth laser comms can scale

      April 23, 2026
      Read More

      Tim Cook Was Very, Very Good at Making Money

      April 22, 2026
      Read More

      SCAND LLC – Company Profile

      April 21, 2026
      Read More
    • Lifestyle
      • Travel
    • Feel Good
    • Get In Touch
    SBM Global News
    Demo
    Home»Technology»How confidential computing could secure generative AI adoption
    Technology

    How confidential computing could secure generative AI adoption

    By Staff WriterJune 30, 20235 Mins Read
    Facebook Twitter LinkedIn Reddit Email
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Ayal Yogev Contributor
    Share on Twitter

    Ayal Yogev is the co-founder and CEO of Anjuna, a multi-cloud confidential computing platform.

    Generative AI has the potential to change everything. It can inform new products, companies, industries, and even economies. But what makes it different and better than “traditional” AI could also make it dangerous.

    Its unique ability to create has opened up an entirely new set of security and privacy concerns.

    Enterprises are suddenly having to ask themselves new questions: Do I have the rights to the training data? To the model? To the outputs? Does the system itself have rights to data that’s created in the future? How are rights to that system protected? How do I govern data privacy in a model using generative AI? The list goes on.

    It’s no surprise that many enterprises are treading lightly. Blatant security and privacy vulnerabilities coupled with a hesitancy to rely on existing Band-Aid solutions have pushed many to ban these tools entirely. But there is hope.

    Confidential computing — a new approach to data security that protects data while in use and ensures code integrity — is the answer to the more complex and serious security concerns of large language models (LLMs). It’s poised to help enterprises embrace the full power of generative AI without compromising on safety. Before I explain, let’s first take a look at what makes generative AI uniquely vulnerable.

    Generative AI has the capacity to ingest an entire company’s data, or even a knowledge-rich subset, into a queryable intelligent model that provides brand new ideas on tap. This has massive appeal, but it also makes it extremely difficult for enterprises to maintain control over their proprietary data and stay compliant with evolving regulatory requirements.

    Protecting training data and models must be the top priority; it’s no longer sufficient to encrypt fields in databases or rows on a form.

    This concentration of knowledge and subsequent generative outcomes, without adequate data security and trust control, could inadvertently weaponize generative AI for abuse, theft, and illicit use.

    Indeed, employees are increasingly feeding confidential business documents, client data, source code, and other pieces of regulated information into LLMs. Since these models are partly trained on new inputs, this could lead to major leaks of intellectual property in the event of a breach. And if the models themselves are compromised, any content that a company has been legally or contractually obligated to protect might also be leaked. In a worst-case scenario, theft of a model and its data would allow a competitor or nation-state actor to duplicate everything and steal that data.

    These are high stakes. Gartner recently found that 41% of organizations have experienced an AI privacy breach or security incident—and over half are the result of a data compromise by an internal party. The advent of generative AI is bound to grow these numbers.

    Separately, enterprises also need to keep up with evolving privacy regulations when they invest in generative AI. Across industries, there’s a deep responsibility and incentive to stay compliant with data requirements. In healthcare, for example, AI-powered personalized medicine has huge potential when it comes to improving patient outcomes and overall efficiency. But providers and researchers will need to access and work with large amounts of sensitive patient data while still staying compliant, presenting a new quandary.

    To address these challenges, and the rest that will inevitably arise, generative AI needs a new security foundation. Protecting training data and models must be the top priority; it’s no longer sufficient to encrypt fields in databases or rows on a form.

    Demo

    In scenarios where generative AI outcomes are used for important decisions, evidence of the integrity of the code and data—and the trust it conveys—will be absolutely critical, both for compliance and for potentially legal liability management. There must be a way to provide airtight protection for the entire computation and the state in which it runs.

    The advent of “confidential” generative AI

    Confidential computing offers a simple, yet hugely powerful way out of what would otherwise seem to be an intractable problem. With confidential computing, data and IP are completely isolated from infrastructure owners and made only accessible to trusted applications running on trusted CPUs. Data privacy is ensured through encryption, even during execution.

    Data security and privacy become intrinsic properties of cloud computing—so much so that even if a malicious attacker breaches infrastructure data, IP and code are completely invisible to that bad actor. This is perfect for generative AI, mitigating its security, privacy, and attack risks.

    Confidential computing has been increasingly gaining traction as a security game-changer. Every major cloud provider and chip maker is investing in it, with leaders at Azure, AWS, and GCP all proclaiming its efficacy. Now, the same technology that’s converting even the most steadfast cloud holdouts could be the solution that helps generative AI take off securely. Leaders must begin to take it seriously and understand its profound impacts.

    With confidential computing, enterprises gain assurance that generative AI models only learn on data they intend to use, and nothing else. Training with private datasets across a network of trusted sources across clouds provides full control and peace of mind. All information, whether an input or an output, remains completely protected, and behind a company’s own four walls.

    How confidential computing could secure generative AI adoption by Walter Thompson originally published on TechCrunch

    Originally published at techcrunch.com

    devices gadgets notebooks phones tablets technology
    Share. Facebook Twitter LinkedIn Email Reddit
    Previous ArticleAs Someone Who Was Born And Raised In Hawaii, These 15 Things Had Me In Total Shock When I Moved To The Mainland
    Next Article FTC reportedly finalizing its biggest Amazon antitrust case yet

    Related Posts

    Porsche is adding an all-electric Cayenne coupe to its lineup

    April 24, 2026
    Read More

    Jahid Babu Tech – Company Profile

    April 24, 2026
    Read More

    NASA’s Artemis II Moon mission shows space-to-Earth laser comms can scale

    April 23, 2026
    Read More
    Add A Comment

    Leave A Reply Cancel Reply

    Demo
    Top Posts

    Former FBI, CIA Head Has ‘Serious Concerns’ With Trump Cabinet Picks

    December 28, 2024435

    Emirates to operate next-gen A350 on the third daily service to Cape Town

    January 14, 2026256

    AAVE Price Prediction: Target $215-225 by Mid-January 2025 as Technical Indicators Signal Bullish Momentum

    December 15, 2025240

    Ventive Hospitality Joins Green Fins: Strong ESG Lift

    February 17, 2026211
    Don't Miss
    Investment

    They’re Coming For Your Social Security

    By Staff WriterApril 25, 20266 Mins Read

    Seven years from now, more or less, the Social Security system will go bust. There…

    Read More

    White House Allowed Officials’ Text Messages to Be Deleted, Lawsuit Says

    April 25, 2026

    How to Use Manuka Honey: A Comprehensive Practical Guide

    April 25, 2026

    The Most Common Issues Gen Xers Bring Up In Therapy

    April 25, 2026
    Stay In Touch
    • Facebook
    • Twitter
    Demo
    About Us

    Small Business Minder brings together business and related news from around the world in one place. Follow us for all the business news you'll need.

    Facebook X (Twitter)
    Our Picks

    They’re Coming For Your Social Security

    April 25, 2026

    White House Allowed Officials’ Text Messages to Be Deleted, Lawsuit Says

    April 25, 2026
    Most Popular

    Former FBI, CIA Head Has ‘Serious Concerns’ With Trump Cabinet Picks

    December 28, 2024435

    Emirates to operate next-gen A350 on the third daily service to Cape Town

    January 14, 2026256
    © 2026 Small Business Minder
    • Home
    • Get In Touch

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. To get the most from our site, please disable your Ad Blocker.