Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add some additional whitepapers, leaving Profian links for now #153

Merged
merged 1 commit into from
Dec 15, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 3 additions & 1 deletion resources/2022-10-01-insider-risk.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,6 @@ Every time an application runs on any platform – from the largest mainframe to

**Source**: Profian

**Link**: https://profian.com/white-paper/white-paper-managing-insider-risk-with-confidential-computing/
**Link**: https://profian.com/white-paper/white-paper-managing-insider-risk-with-confidential-computing/

**PDF**: [Managing Insider Risk with Confidential Computing](/assets/docs/Managing_Insider_Risk_with_Confidential_Computing.pdf)
4 changes: 3 additions & 1 deletion resources/2022-10-10-runtime-isolation.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,6 @@ Every time an application runs on any platform – from the largest mainframe to

**Source**: Profian

**Link**: https://profian.com/white-paper/white-paper-the-3-types-of-runtime-security-isolation/
**Link**: https://profian.com/white-paper/white-paper-the-3-types-of-runtime-security-isolation/

**PDF**: [The Three Types of Runtime Isolation](/assets/docs/The_three_types_of_runtime_isolation.pdf)
4 changes: 3 additions & 1 deletion resources/2022-10-25-privacy-enhancing-technologies.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,6 @@ Learn more about the important characteristics of Privacy-enhancing technologies

**Source**: Profian

**Link**: https://profian.com/white-paper/pets-and-confidential-computing-compared/
**Link**: https://profian.com/white-paper/pets-and-confidential-computing-compared/

**PDF**: [PETS and Confidential Computing compared.pdf](/assets/docs/PETS_and_CC_compared.pdf)
6 changes: 4 additions & 2 deletions resources/2022-10-26-whats-confidential-computing.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,10 +2,12 @@
slug: 2022-10-26-whats-confidential-computing
title: "What is Confidential Computing?"
authors: [jen]
tags: [Profian's Blog]
tags: [Profian's Blog, White Paper]
---
Confidential Computing is a leading-edge security technology that encrypts sensitive data in use in a public cloud, private cloud or on-premises. It completes the data security triangle since data at rest (in storage) and in transit (across networks) is routinely encrypted.

**Source**: Profian's Blog

**Link**: https://profian.com/what-is-confidential-computing/
**Link**: https://profian.com/what-is-confidential-computing/

**PDF**: [What is Confidential Computing.pdf](/assets/docs/What_is_Confidential_Computing.pdf)
Binary file not shown.
Binary file added static/assets/docs/PETS_and_CC_compared.pdf
Binary file not shown.
Binary file not shown.
Binary file not shown.