Skip to content

Commit

Permalink
feat: add some additional whitepapers, leaving Profian links for now
Browse files Browse the repository at this point in the history
Signed-off-by: Richard Zak <[email protected]>
  • Loading branch information
rjzak committed Dec 15, 2023
1 parent e0a4c8b commit 0407596
Show file tree
Hide file tree
Showing 8 changed files with 13 additions and 5 deletions.
4 changes: 3 additions & 1 deletion resources/2022-10-01-insider-risk.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,6 @@ Every time an application runs on any platform – from the largest mainframe to

**Source**: Profian

**Link**: https://profian.com/white-paper/white-paper-managing-insider-risk-with-confidential-computing/
**Link**: https://profian.com/white-paper/white-paper-managing-insider-risk-with-confidential-computing/

**PDF**: [Managing Insider Risk with Confidential Computing](/assets/docs/Managing_Insider_Risk_with_Confidential_Computing.pdf)
4 changes: 3 additions & 1 deletion resources/2022-10-10-runtime-isolation.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,6 @@ Every time an application runs on any platform – from the largest mainframe to

**Source**: Profian

**Link**: https://profian.com/white-paper/white-paper-the-3-types-of-runtime-security-isolation/
**Link**: https://profian.com/white-paper/white-paper-the-3-types-of-runtime-security-isolation/

**PDF**: [The Three Types of Runtime Isolation](/assets/docs/The_three_types_of_runtime_isolation.pdf)
4 changes: 3 additions & 1 deletion resources/2022-10-25-privacy-enhancing-technologies.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,6 @@ Learn more about the important characteristics of Privacy-enhancing technologies

**Source**: Profian

**Link**: https://profian.com/white-paper/pets-and-confidential-computing-compared/
**Link**: https://profian.com/white-paper/pets-and-confidential-computing-compared/

**PDF**: [PETS and Confidential Computing compared.pdf](/assets/docs/PETS_and_CC_compared.pdf)
6 changes: 4 additions & 2 deletions resources/2022-10-26-whats-confidential-computing.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,10 +2,12 @@
slug: 2022-10-26-whats-confidential-computing
title: "What is Confidential Computing?"
authors: [jen]
tags: [Profian's Blog]
tags: [Profian's Blog, White Paper]
---
Confidential Computing is a leading-edge security technology that encrypts sensitive data in use in a public cloud, private cloud or on-premises. It completes the data security triangle since data at rest (in storage) and in transit (across networks) is routinely encrypted.

**Source**: Profian's Blog

**Link**: https://profian.com/what-is-confidential-computing/
**Link**: https://profian.com/what-is-confidential-computing/

**PDF**: [What is Confidential Computing.pdf](/assets/docs/What_is_Confidential_Computing.pdf)
Binary file not shown.
Binary file added static/assets/docs/PETS_and_CC_compared.pdf
Binary file not shown.
Binary file not shown.
Binary file not shown.

0 comments on commit 0407596

Please sign in to comment.