![]() ![]() As part of this proof of concept, healthcare institutions can share data securely to build a central AI model trained to detect and prevent diseases. In another part of healthcare, Accenture is integrating Project Amber into an artificial intelligence (AI)-based framework for protecting data. In this instance, Intel’s solution provides additional security protections for internet of things (IoT) and medical internet of things (MIoT) devices that sit beyond the network’s edge. How Leidos and Accenture are using Project AmberĪt this stage, Leidos has a new Project Amber proof of concept that offers the potential to support its QTC Mobile Medical Clinics, where vans perform in-field medical exams and health information processing for U.S. Intel essentially combines zero-trust attestation with confidential computing to help enterprises verify the security of third-party cloud services and software. “With the introduction of Project Amber at Intel Vision in May ’22, Intel is taking confidential computing to the next level in our commitment to a zero-trust approach to attestation and the verification of computing assets at the network, edge and in the cloud,” said Intel senior vice president, chief technology officer, and general manager of the software and advanced technology group (SATG), Greg Lavender. Confidential computing has the potential to mitigate supply chain risks by encrypting data-in-use so that it’s not accessible to unauthorized third parties processing or transmitting the data. One of the key technologies that has the potential to address supply chain security is confidential computing. While there are many reasons for this lack in confidence, a spate of supply chain attacks, starting with the SolarWinds breach in 2020, have highlighted that organizations can face serious exposure to risk if third-party vendors fail to secure their environments against threat actors. Currently, only 37% of IT professionals feel very confident in the security of the supply chain. The release of Project Amber comes as more and more organizations are struggling to place trust in the security of third-party software vendors. Register Here Restoring faith in the software supply chain Join today’s leading executives at the Low-Code/No-Code Summit virtually on November 9. ![]()
0 Comments
Leave a Reply. |