CINXE.COM

What is confidential computing? - CYSEC (data encryption)

<html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <title>What is confidential computing? - CYSEC (data encryption)</title><link rel="preload" data-rocket-preload as="style" href="https://fonts.googleapis.com/css?family=Montserrat%3A400%2C700%7CSora%3A300%2C400%2C300%2C400%2C300%2C400%2C300%2C400%2C300%2C400%2C300%2C400%7CRoboto%3A300%2C400&#038;display=swap" /><link rel="stylesheet" href="https://fonts.googleapis.com/css?family=Montserrat%3A400%2C700%7CSora%3A300%2C400%2C300%2C400%2C300%2C400%2C300%2C400%2C300%2C400%2C300%2C400%7CRoboto%3A300%2C400&#038;display=swap" media="print" onload="this.media='all'" /><noscript><link rel="stylesheet" href="https://fonts.googleapis.com/css?family=Montserrat%3A400%2C700%7CSora%3A300%2C400%2C300%2C400%2C300%2C400%2C300%2C400%2C300%2C400%2C300%2C400%7CRoboto%3A300%2C400&#038;display=swap" /></noscript><link rel="preload" data-rocket-preload as="image" href="https://www.cysec.com/wp-content/uploads/2021/11/Cloud-magnifying-glass-with-analytics-data-scaled.jpeg?id=2555" fetchpriority="high"> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style> <!-- Google Tag Manager for WordPress by gtm4wp.com --> <script data-cfasync="false" data-pagespeed-no-defer> var gtm4wp_datalayer_name = "dataLayer"; var dataLayer = dataLayer || []; </script> <!-- End Google Tag Manager for WordPress by gtm4wp.com --> <!-- This site is optimized with the Yoast SEO plugin v24.7 - https://yoast.com/wordpress/plugins/seo/ --> <meta name="description" content="Digitizing alone isn’t enough to transform business processes in today’s privacy-focused world. Encryption technologies, too, need transforming. For a growing number of enterprises, confidential computing is bridging the encryption gap." /> <link rel="canonical" href="https://www.cysec.com/what-is-confidential-computing/" /> <meta property="og:locale" content="en_GB" /> <meta property="og:type" content="article" /> <meta property="og:title" content="What is confidential computing? - CYSEC (data encryption)" /> <meta property="og:description" content="Digitizing alone isn’t enough to transform business processes in today’s privacy-focused world. Encryption technologies, too, need transforming. For a growing number of enterprises, confidential computing is bridging the encryption gap." /> <meta property="og:url" content="https://www.cysec.com/what-is-confidential-computing/" /> <meta property="og:site_name" content="CYSEC" /> <meta property="article:published_time" content="2021-11-16T13:10:16+00:00" /> <meta property="article:modified_time" content="2024-03-18T14:56:39+00:00" /> <meta property="og:image" content="https://www.cysec.com/wp-content/uploads/2021/11/Cloud-magnifying-glass-with-analytics-data-scaled.jpeg" /> <meta property="og:image:width" content="2560" /> <meta property="og:image:height" content="1600" /> <meta property="og:image:type" content="image/jpeg" /> <meta name="author" content="admin_cysec2021" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:label1" content="Written by" /> <meta name="twitter:data1" content="admin_cysec2021" /> <meta name="twitter:label2" content="Estimated reading time" /> <meta name="twitter:data2" content="8 minutes" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"WebPage","@id":"https://www.cysec.com/what-is-confidential-computing/","url":"https://www.cysec.com/what-is-confidential-computing/","name":"What is confidential computing? - CYSEC (data encryption)","isPartOf":{"@id":"https://www.cysec.com/#website"},"primaryImageOfPage":{"@id":"https://www.cysec.com/what-is-confidential-computing/#primaryimage"},"image":{"@id":"https://www.cysec.com/what-is-confidential-computing/#primaryimage"},"thumbnailUrl":"https://www.cysec.com/wp-content/uploads/2021/11/Cloud-magnifying-glass-with-analytics-data-scaled.jpeg","datePublished":"2021-11-16T13:10:16+00:00","dateModified":"2024-03-18T14:56:39+00:00","author":{"@id":"https://www.cysec.com/#/schema/person/7960be482926b7c1e29e8c224f74293a"},"description":"Digitizing alone isn’t enough to transform business processes in today’s privacy-focused world. Encryption technologies, too, need transforming. For a growing number of enterprises, confidential computing is bridging the encryption gap.","breadcrumb":{"@id":"https://www.cysec.com/what-is-confidential-computing/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https://www.cysec.com/what-is-confidential-computing/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https://www.cysec.com/what-is-confidential-computing/#primaryimage","url":"https://www.cysec.com/wp-content/uploads/2021/11/Cloud-magnifying-glass-with-analytics-data-scaled.jpeg","contentUrl":"https://www.cysec.com/wp-content/uploads/2021/11/Cloud-magnifying-glass-with-analytics-data-scaled.jpeg","width":2560,"height":1600,"caption":"Cloud online storage technology concept. Big data data information exchange available. Magnifying glass with analytics data"},{"@type":"BreadcrumbList","@id":"https://www.cysec.com/what-is-confidential-computing/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https://www.cysec.com/"},{"@type":"ListItem","position":2,"name":"What is confidential computing?"}]},{"@type":"WebSite","@id":"https://www.cysec.com/#website","url":"https://www.cysec.com/","name":"CYSEC","description":"Securing the space internet","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://www.cysec.com/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https://www.cysec.com/#/schema/person/7960be482926b7c1e29e8c224f74293a","name":"admin_cysec2021","url":"https://www.cysec.com/author/admin_cysec2021/"}]}</script> <!-- / Yoast SEO plugin. --> <link rel='dns-prefetch' href='//js.hs-scripts.com' /> <link rel='dns-prefetch' href='//code.jquery.com' /> <link rel='dns-prefetch' href='//cdnjs.cloudflare.com' /> <link rel='dns-prefetch' href='//stackpath.bootstrapcdn.com' /> <link rel='dns-prefetch' href='//unpkg.com' /> <link rel='dns-prefetch' href='//fonts.googleapis.com' /> <link rel='dns-prefetch' href='//pro.fontawesome.com' /> <link rel='dns-prefetch' href='//use.fontawesome.com' /> <link href='https://fonts.gstatic.com' crossorigin rel='preconnect' /> <link rel="alternate" type="application/rss+xml" title="CYSEC &raquo; What is confidential computing? Comments Feed" href="https://www.cysec.com/what-is-confidential-computing/feed/" /> <!-- This site uses the Google Analytics by MonsterInsights plugin v9.4.0 - Using Analytics tracking - https://www.monsterinsights.com/ --> <script src="//www.googletagmanager.com/gtag/js?id=G-4MTSWRDKKD" data-cfasync="false" data-wpfc-render="false" type="text/javascript" async></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript"> var mi_version = '9.4.0'; var mi_track_user = true; var mi_no_track_reason = ''; var MonsterInsightsDefaultLocations = {"page_location":"https:\/\/www.cysec.com\/what-is-confidential-computing\/"}; if ( typeof MonsterInsightsPrivacyGuardFilter === 'function' ) { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsPrivacyGuardFilter( MonsterInsightsExcludeQuery ) : MonsterInsightsPrivacyGuardFilter( MonsterInsightsDefaultLocations ); } else { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsExcludeQuery : MonsterInsightsDefaultLocations; } var disableStrs = [ 'ga-disable-G-4MTSWRDKKD', ]; /* Function to detect opted out users */ function __gtagTrackerIsOptedOut() { for (var index = 0; index < disableStrs.length; index++) { if (document.cookie.indexOf(disableStrs[index] + '=true') > -1) { return true; } } return false; } /* Disable tracking if the opt-out cookie exists. */ if (__gtagTrackerIsOptedOut()) { for (var index = 0; index < disableStrs.length; index++) { window[disableStrs[index]] = true; } } /* Opt-out function */ function __gtagTrackerOptout() { for (var index = 0; index < disableStrs.length; index++) { document.cookie = disableStrs[index] + '=true; expires=Thu, 31 Dec 2099 23:59:59 UTC; path=/'; window[disableStrs[index]] = true; } } if ('undefined' === typeof gaOptout) { function gaOptout() { __gtagTrackerOptout(); } } window.dataLayer = window.dataLayer || []; window.MonsterInsightsDualTracker = { helpers: {}, trackers: {}, }; if (mi_track_user) { function __gtagDataLayer() { dataLayer.push(arguments); } function __gtagTracker(type, name, parameters) { if (!parameters) { parameters = {}; } if (parameters.send_to) { __gtagDataLayer.apply(null, arguments); return; } if (type === 'event') { parameters.send_to = monsterinsights_frontend.v4_id; var hookName = name; if (typeof parameters['event_category'] !== 'undefined') { hookName = parameters['event_category'] + ':' + name; } if (typeof MonsterInsightsDualTracker.trackers[hookName] !== 'undefined') { MonsterInsightsDualTracker.trackers[hookName](parameters); } else { __gtagDataLayer('event', name, parameters); } } else { __gtagDataLayer.apply(null, arguments); } } __gtagTracker('js', new Date()); __gtagTracker('set', { 'developer_id.dZGIzZG': true, }); if ( MonsterInsightsLocations.page_location ) { __gtagTracker('set', MonsterInsightsLocations); } __gtagTracker('config', 'G-4MTSWRDKKD', {"forceSSL":"true","link_attribution":"true"} ); window.gtag = __gtagTracker; (function () { /* https://developers.google.com/analytics/devguides/collection/analyticsjs/ */ /* ga and __gaTracker compatibility shim. */ var noopfn = function () { return null; }; var newtracker = function () { return new Tracker(); }; var Tracker = function () { return null; }; var p = Tracker.prototype; p.get = noopfn; p.set = noopfn; p.send = function () { var args = Array.prototype.slice.call(arguments); args.unshift('send'); __gaTracker.apply(null, args); }; var __gaTracker = function () { var len = arguments.length; if (len === 0) { return; } var f = arguments[len - 1]; if (typeof f !== 'object' || f === null || typeof f.hitCallback !== 'function') { if ('send' === arguments[0]) { var hitConverted, hitObject = false, action; if ('event' === arguments[1]) { if ('undefined' !== typeof arguments[3]) { hitObject = { 'eventAction': arguments[3], 'eventCategory': arguments[2], 'eventLabel': arguments[4], 'value': arguments[5] ? arguments[5] : 1, } } } if ('pageview' === arguments[1]) { if ('undefined' !== typeof arguments[2]) { hitObject = { 'eventAction': 'page_view', 'page_path': arguments[2], } } } if (typeof arguments[2] === 'object') { hitObject = arguments[2]; } if (typeof arguments[5] === 'object') { Object.assign(hitObject, arguments[5]); } if ('undefined' !== typeof arguments[1].hitType) { hitObject = arguments[1]; if ('pageview' === hitObject.hitType) { hitObject.eventAction = 'page_view'; } } if (hitObject) { action = 'timing' === arguments[1].hitType ? 'timing_complete' : hitObject.eventAction; hitConverted = mapArgs(hitObject); __gtagTracker('event', action, hitConverted); } } return; } function mapArgs(args) { var arg, hit = {}; var gaMap = { 'eventCategory': 'event_category', 'eventAction': 'event_action', 'eventLabel': 'event_label', 'eventValue': 'event_value', 'nonInteraction': 'non_interaction', 'timingCategory': 'event_category', 'timingVar': 'name', 'timingValue': 'value', 'timingLabel': 'event_label', 'page': 'page_path', 'location': 'page_location', 'title': 'page_title', 'referrer' : 'page_referrer', }; for (arg in args) { if (!(!args.hasOwnProperty(arg) || !gaMap.hasOwnProperty(arg))) { hit[gaMap[arg]] = args[arg]; } else { hit[arg] = args[arg]; } } return hit; } try { f.hitCallback(); } catch (ex) { } }; __gaTracker.create = newtracker; __gaTracker.getByName = newtracker; __gaTracker.getAll = function () { return []; }; __gaTracker.remove = noopfn; __gaTracker.loaded = true; window['__gaTracker'] = __gaTracker; })(); } else { console.log(""); (function () { function __gtagTracker() { return null; } window['__gtagTracker'] = __gtagTracker; window['gtag'] = __gtagTracker; })(); } </script> <!-- / Google Analytics by MonsterInsights --> <link rel='stylesheet' id='custom-main-css' href='https://www.cysec.com/wp-content/themes/cysec-child/assets/css/custom-min.css?ver=ebf2a86ba80ab5379f1df9ee7be24647' type='text/css' media='all' /> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='wp-block-library-css' href='https://www.cysec.com/wp-includes/css/dist/block-library/style.min.css?ver=ebf2a86ba80ab5379f1df9ee7be24647' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-svg-styles-css' href='https://www.cysec.com/wp-content/uploads/font-awesome/v5.15.4/css/svg-with-js.css' type='text/css' media='all' /> <style id='font-awesome-svg-styles-inline-css' type='text/css'> .wp-block-font-awesome-icon svg::before, .wp-rich-text-font-awesome-icon svg::before {content: unset;} </style> <link rel='stylesheet' id='bb-tcs-editor-style-shared-css' href='https://www.cysec.com/wp-content/themes/cysec/editor-style-shared.css' type='text/css' media='all' /> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='image-hover-effects-css-css' href='https://www.cysec.com/wp-content/plugins/mega-addons-for-visual-composer/css/ihover.css?ver=ebf2a86ba80ab5379f1df9ee7be24647' type='text/css' media='all' /> <link rel='stylesheet' id='style-css-css' href='https://www.cysec.com/wp-content/plugins/mega-addons-for-visual-composer/css/style.css?ver=ebf2a86ba80ab5379f1df9ee7be24647' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-latest-css' href='https://www.cysec.com/wp-content/plugins/mega-addons-for-visual-composer/css/font-awesome/css/all.css?ver=ebf2a86ba80ab5379f1df9ee7be24647' type='text/css' media='all' /> <link rel='stylesheet' id='megamenu-css' href='https://www.cysec.com/wp-content/uploads/maxmegamenu/style.css?ver=757fad' type='text/css' media='all' /> <link rel='stylesheet' id='dashicons-css' href='https://www.cysec.com/wp-includes/css/dashicons.min.css?ver=ebf2a86ba80ab5379f1df9ee7be24647' type='text/css' media='all' /> <link rel='stylesheet' id='megamenu-genericons-css' href='https://www.cysec.com/wp-content/plugins/megamenu-pro/icons/genericons/genericons/genericons.css?ver=2.2.7' type='text/css' media='all' /> <link rel='stylesheet' id='megamenu-fontawesome-css' href='https://www.cysec.com/wp-content/plugins/megamenu-pro/icons/fontawesome/css/font-awesome.min.css?ver=2.2.7' type='text/css' media='all' /> <link rel='stylesheet' id='megamenu-fontawesome5-css' href='https://www.cysec.com/wp-content/plugins/megamenu-pro/icons/fontawesome5/css/all.min.css?ver=2.2.7' type='text/css' media='all' /> <link rel='stylesheet' id='parent-style-css' href='https://www.cysec.com/wp-content/themes/cysec/style.css?ver=ebf2a86ba80ab5379f1df9ee7be24647' type='text/css' media='all' /> <link rel='stylesheet' id='bootstrap-css' href='https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/css/bootstrap.min.css?ver=ebf2a86ba80ab5379f1df9ee7be24647' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-css' href='https://pro.fontawesome.com/releases/v5.13.0/css/all.css?ver=ebf2a86ba80ab5379f1df9ee7be24647' type='text/css' media='all' /> <link rel='stylesheet' id='flickity-css' href='https://unpkg.com/flickity@2/dist/flickity.min.css?ver=ebf2a86ba80ab5379f1df9ee7be24647' type='text/css' media='all' /> <link rel='stylesheet' id='theme-style-css' href='https://www.cysec.com/wp-content/themes/cysec-child/style.css?ver=ebf2a86ba80ab5379f1df9ee7be24647' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-official-css' href='https://use.fontawesome.com/releases/v5.15.4/css/all.css' type='text/css' media='all' integrity="sha384-DyZ88mC6Up2uqS4h/KRgHuoeGwBcD4Ng9SiP4dIRy0EXTlnuz47vAwmeGwVChigm" crossorigin="anonymous" /> <link rel='stylesheet' id='js_composer_front-css' href='https://www.cysec.com/wp-content/plugins/js_composer/assets/css/js_composer.min.css?ver=8.0.1' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-official-v4shim-css' href='https://use.fontawesome.com/releases/v5.15.4/css/v4-shims.css' type='text/css' media='all' integrity="sha384-Vq76wejb3QJM4nDatBa5rUOve+9gkegsjCebvV/9fvXlGWo4HCMR4cJZjjcF6Viv" crossorigin="anonymous" /> <style id='font-awesome-official-v4shim-inline-css' type='text/css'> @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-brands-400.eot"), url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-brands-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-brands-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-brands-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-brands-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-brands-400.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-solid-900.eot"), url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-solid-900.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-solid-900.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-solid-900.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-solid-900.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-solid-900.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-regular-400.eot"), url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-regular-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-regular-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-regular-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-regular-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.4/webfonts/fa-regular-400.svg#fontawesome") format("svg"); unicode-range: U+F004-F005,U+F007,U+F017,U+F022,U+F024,U+F02E,U+F03E,U+F044,U+F057-F059,U+F06E,U+F070,U+F075,U+F07B-F07C,U+F080,U+F086,U+F089,U+F094,U+F09D,U+F0A0,U+F0A4-F0A7,U+F0C5,U+F0C7-F0C8,U+F0E0,U+F0EB,U+F0F3,U+F0F8,U+F0FE,U+F111,U+F118-F11A,U+F11C,U+F133,U+F144,U+F146,U+F14A,U+F14D-F14E,U+F150-F152,U+F15B-F15C,U+F164-F165,U+F185-F186,U+F191-F192,U+F1AD,U+F1C1-F1C9,U+F1CD,U+F1D8,U+F1E3,U+F1EA,U+F1F6,U+F1F9,U+F20A,U+F247-F249,U+F24D,U+F254-F25B,U+F25D,U+F267,U+F271-F274,U+F279,U+F28B,U+F28D,U+F2B5-F2B6,U+F2B9,U+F2BB,U+F2BD,U+F2C1-F2C2,U+F2D0,U+F2D2,U+F2DC,U+F2ED,U+F328,U+F358-F35B,U+F3A5,U+F3D1,U+F410,U+F4AD; } </style> <!--n2css--><!--n2js--><script type="text/javascript" src="https://www.cysec.com/wp-content/plugins/google-analytics-for-wordpress/assets/js/frontend-gtag.min.js?ver=9.4.0" id="monsterinsights-frontend-script-js" async="async" data-wp-strategy="async"></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript" id='monsterinsights-frontend-script-js-extra'>/* <![CDATA[ */ var monsterinsights_frontend = {"js_events_tracking":"true","download_extensions":"doc,pdf,ppt,zip,xls,docx,pptx,xlsx","inbound_paths":"[{\"path\":\"\\\/go\\\/\",\"label\":\"affiliate\"},{\"path\":\"\\\/recommend\\\/\",\"label\":\"affiliate\"},{\"path\":\"\\\/linkedin\\\/\",\"label\":\"linkedin\"}]","home_url":"https:\/\/www.cysec.com","hash_tracking":"false","v4_id":"G-4MTSWRDKKD"};/* ]]> */ </script> <script type="text/javascript" src="https://code.jquery.com/jquery-3.3.1.slim.min.js?ver=ebf2a86ba80ab5379f1df9ee7be24647" id="jquery-slim-js"></script> <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.7/umd/popper.min.js?ver=ebf2a86ba80ab5379f1df9ee7be24647" id="popper-js"></script> <script type="text/javascript" src="https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/js/bootstrap.min.js?ver=ebf2a86ba80ab5379f1df9ee7be24647" id="bootstrap-js"></script> <script type="text/javascript" src="https://unpkg.com/flickity@2/dist/flickity.pkgd.min.js?ver=ebf2a86ba80ab5379f1df9ee7be24647" id="flickity-js"></script> <script type="text/javascript" src="https://www.cysec.com/wp-content/themes/cysec-child/assets/js/app.js?ver=ebf2a86ba80ab5379f1df9ee7be24647" id="app.js-js"></script> <script type="text/javascript" src="https://www.cysec.com/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://www.cysec.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script></script><link rel="https://api.w.org/" href="https://www.cysec.com/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.cysec.com/wp-json/wp/v2/posts/2552" /><link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.cysec.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.cysec.com%2Fwhat-is-confidential-computing%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.cysec.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.cysec.com%2Fwhat-is-confidential-computing%2F&#038;format=xml" /> <!-- GA Google Analytics @ https://m0n.co/ga --> <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-176420172-1', 'auto'); ga('require', 'displayfeatures'); ga('require', 'linkid'); ga('send', 'pageview'); </script> <!-- Global site tag (gtag.js) - Google Analytics --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-1MEV0872V6"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-1MEV0872V6'); </script> <!-- Global site tag (gtag.js) - Google Ads: 331997138 --> <script async src="https://www.googletagmanager.com/gtag/js?id=AW-331997138"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'AW-331997138'); </script> <!-- Style floating button contact start --> <style> *{padding:0;margin:0;} .float{ position:fixed; width:60px; height:60px; bottom:40px; right:40px; background-color:#12174B; color:#FFF; border-radius:50px; text-align:center; box-shadow: 1px 1px 4px #FFF; } .float:hover{ background-color:#FFF; color:#12174B; } .my-float{ margin-top:13px; }</style> <!-- Style floating button contact end --> <script type="text/javascript"> _linkedin_partner_id = "3975073"; window._linkedin_data_partner_ids = window._linkedin_data_partner_ids || []; window._linkedin_data_partner_ids.push(_linkedin_partner_id); </script><script type="text/javascript"> (function(l) { if (!l){window.lintrk = function(a,b){window.lintrk.q.push([a,b])}; window.lintrk.q=[]} var s = document.getElementsByTagName("script")[0]; var b = document.createElement("script"); b.type = "text/javascript";b.async = true; b.src = "https://snap.licdn.com/li.lms-analytics/insight.min.js"; s.parentNode.insertBefore(b, s);})(window.lintrk); </script> <noscript> <img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=3975073&fmt=gif" /> </noscript> <!-- DO NOT COPY THIS SNIPPET! Start of Page Analytics Tracking for HubSpot WordPress plugin v11.2.9--> <script class="hsq-set-content-id" data-content-id="blog-post"> var _hsq = _hsq || []; _hsq.push(["setContentType", "blog-post"]); </script> <!-- DO NOT COPY THIS SNIPPET! End of Page Analytics Tracking for HubSpot WordPress plugin --> <!-- Google Tag Manager for WordPress by gtm4wp.com --> <!-- GTM Container placement set to footer --> <script data-cfasync="false" data-pagespeed-no-defer> var dataLayer_content = {"pagePostType":"post","pagePostType2":"single-post","pageCategory":["blog","blog-arca-trusted-os"],"pagePostAuthor":"admin_cysec2021"}; dataLayer.push( dataLayer_content ); </script> <script data-cfasync="false"> (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= '//www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-N4TXXH3'); </script> <!-- End Google Tag Manager for WordPress by gtm4wp.com --> <script> (function(h,o,t,j,a,r){ h.hj=h.hj||function(){(h.hj.q=h.hj.q||[]).push(arguments)}; h._hjSettings={hjid:2633734,hjsv:5}; a=o.getElementsByTagName('head')[0]; r=o.createElement('script');r.async=1; r.src=t+h._hjSettings.hjid+j+h._hjSettings.hjsv; a.appendChild(r); })(window,document,'//static.hotjar.com/c/hotjar-','.js?sv='); </script> <meta name="generator" content="Powered by WPBakery Page Builder - drag and drop page builder for WordPress."/> <link rel="icon" href="https://www.cysec.com/wp-content/uploads/2024/03/cropped-shield-testimonials-32x32.png" sizes="32x32" /> <link rel="icon" href="https://www.cysec.com/wp-content/uploads/2024/03/cropped-shield-testimonials-192x192.png" sizes="192x192" /> <link rel="apple-touch-icon" href="https://www.cysec.com/wp-content/uploads/2024/03/cropped-shield-testimonials-180x180.png" /> <meta name="msapplication-TileImage" content="https://www.cysec.com/wp-content/uploads/2024/03/cropped-shield-testimonials-270x270.png" /> <style type="text/css" data-type="vc_shortcodes-custom-css">.vc_custom_1636993197944{background-image: url(https://www.cysec.com/wp-content/uploads/2021/11/Cloud-magnifying-glass-with-analytics-data-scaled.jpeg?id=2555) !important;}.vc_custom_1622106940926{background-image: url(https://www.cysec.com/wp-content/uploads/2020/05/callum-wale-AU1rKyKPJco-unsplash-copy-scaled.jpg?id=1598) !important;}.vc_custom_1636538750785{padding-bottom: 40px !important;}</style><noscript><style> .wpb_animate_when_almost_visible { opacity: 1; }</style></noscript><style type="text/css">/** Mega Menu CSS: fs **/</style> <link rel="shortcut icon" href="https://www.cysec.com/wp-content/themes/cysec-child/assets/images/favicon.ico" type="image/x-icon"> <link rel="icon" sizes="32x32" href="https://www.cysec.com/wp-content/themes/cysec-child/assets/images/favicon-32x32.png" type="image/png"> <link rel="icon" sizes="16x16" href="https://www.cysec.com/wp-content/themes/cysec-child/assets/images/favicon-16x16.png" type="image/png"> <link rel="apple-touch-icon" sizes="152x152" href="https://www.cysec.com/wp-content/themes/cysec-child/assets/images/apple-touch-icon.png"> <style id="rocket-lazyrender-inline-css">[data-wpr-lazyrender] {content-visibility: auto;}</style><meta name="generator" content="WP Rocket 3.17.3" data-wpr-features="wpr_automatic_lazy_rendering wpr_oci wpr_desktop wpr_preload_links" /></head> <!-- 1--> <body data-rsssl=1 class="post-template-default single single-post postid-2552 single-format-standard burgundy mega-menu-primary-menu wpb-js-composer js-comp-ver-8.0.1 vc_responsive"> <script type="text/javascript"> (function(window, document, dataLayerName, id) { window[dataLayerName]=window[dataLayerName]||[],window[dataLayerName].push({start:(new Date).getTime(),event:"stg.start"});var scripts=document.getElementsByTagName('script')[0],tags=document.createElement('script'); function stgCreateCookie(a,b,c){var d="";if(c){var e=new Date;e.setTime(e.getTime()+24*c*60*60*1e3),d="; expires="+e.toUTCString()}document.cookie=a+"="+b+d+"; path=/"} var isStgDebug=(window.location.href.match("stg_debug")||document.cookie.match("stg_debug"))&&!window.location.href.match("stg_disable_debug");stgCreateCookie("stg_debug",isStgDebug?1:"",isStgDebug?14:-1); var qP=[];dataLayerName!=="dataLayer"&&qP.push("data_layer_name="+dataLayerName),isStgDebug&&qP.push("stg_debug");var qPString=qP.length>0?("?"+qP.join("&")):""; tags.async=!0,tags.src="//cysec.containers.piwik.pro/"+id+".js"+qPString,scripts.parentNode.insertBefore(tags,scripts); !function(a,n,i){a[n]=a[n]||{};for(var c=0;c<i.length;c++)!function(i){a[n][i]=a[n][i]||{},a[n][i].api=a[n][i].api||function(){var a=[].slice.call(arguments,0);"string"==typeof a[0]&&window[dataLayerName].push({event:n+"."+i+":"+a[0],parameters:[].slice.call(arguments,1)})}}(i[c])}(window,"ppms",["tm","cm"]); })(window, document, 'dataLayer', '8d6d25cf-3d29-5b71-8db7-2e181caa67d2'); </script> <header > <div class="container header-container"> <div class="row"> <div class="col-lg-2 col-9 d-flex align-items-center"> <a class="navbar-brand" href="https://www.cysec.com/"><img src="https://www.cysec.com/wp-content/uploads/2021/04/Cysec-Logo-WEB.svg" class="logo-sticky" /></a> <a class="navbar-brand" href="https://www.cysec.com/"><img src="https://www.cysec.com/wp-content/uploads/2024/05/cysec-logo-white.png" class="logo" /></a> </div> <div class="col-lg-8 col-3 d-flex align-items-center"> <nav class="navbar navbar-expand-lg navbar-light"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#navbar" aria-expanded="false" aria-controls="navbar"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar top-bar"></span> <span class="icon-bar middle-bar"></span> <span class="icon-bar bottom-bar"></span> </button> <div id="mega-menu-wrap-primary_menu" class="mega-menu-wrap"><div class="mega-menu-toggle"><div class="mega-toggle-blocks-left"></div><div class="mega-toggle-blocks-center"></div><div class="mega-toggle-blocks-right"><div class='mega-toggle-block mega-menu-toggle-animated-block mega-toggle-block-1' id='mega-toggle-block-1'><button aria-label="Toggle Menu" class="mega-toggle-animated mega-toggle-animated-slider" type="button" aria-expanded="false"> <span class="mega-toggle-animated-box"> <span class="mega-toggle-animated-inner"></span> </span> </button></div></div></div><ul id="mega-menu-primary_menu" class="mega-menu max-mega-menu mega-menu-horizontal mega-no-js" data-event="hover" data-effect="fade_up" data-effect-speed="200" data-effect-mobile="disabled" data-effect-speed-mobile="0" data-mobile-force-width="body" data-second-click="go" data-document-click="collapse" data-vertical-behaviour="standard" data-breakpoint="61" data-unbind="true" data-mobile-state="collapse_all" data-mobile-direction="vertical" data-hover-intent-timeout="300" data-hover-intent-interval="100"><li class='mega-menu-item mega-menu-item-type-custom mega-menu-item-object-custom mega-menu-item-has-children mega-align-bottom-left mega-menu-flyout mega-menu-item-2765' id='mega-menu-item-2765'><a class="mega-menu-link" href="#" aria-expanded="false" tabindex="0">Products<span class="mega-indicator"></span></a> <ul class="mega-sub-menu"> <li class='mega-menu-item mega-menu-item-type-post_type mega-menu-item-object-page mega-menu-item-8465' id='mega-menu-item-8465'><a class="mega-menu-link" href="https://www.cysec.com/arca-trusted-os/">ARCA Trusted OS</a></li><li class='mega-menu-item mega-menu-item-type-post_type mega-menu-item-object-page mega-menu-item-8942' id='mega-menu-item-8942'><a class="mega-menu-link" href="https://www.cysec.com/arca-satcom/">ARCA Satcom VPN</a></li><li class='mega-menu-item mega-menu-item-type-post_type mega-menu-item-object-page mega-menu-item-8943' id='mega-menu-item-8943'><a class="mega-menu-link" href="https://www.cysec.com/arca-satlink/">Arca Satlink</a></li></ul> </li><li class='mega-menu-item mega-menu-item-type-custom mega-menu-item-object-custom mega-menu-item-has-children mega-align-bottom-left mega-menu-flyout mega-menu-item-2766' id='mega-menu-item-2766'><a class="mega-menu-link" href="#" aria-expanded="false" tabindex="0">Deployments<span class="mega-indicator"></span></a> <ul class="mega-sub-menu"> <li class='mega-menu-item mega-menu-item-type-post_type mega-menu-item-object-page mega-menu-item-8466' id='mega-menu-item-8466'><a class="mega-menu-link" href="https://www.cysec.com/bare-metal/">Bare Metal</a></li><li class='mega-menu-item mega-menu-item-type-post_type mega-menu-item-object-page mega-menu-item-8467' id='mega-menu-item-8467'><a class="mega-menu-link" href="https://www.cysec.com/cloud-virtual-machine/">Cloud Virtual Machine</a></li><li class='mega-menu-item mega-menu-item-type-post_type mega-menu-item-object-page mega-menu-item-8468' id='mega-menu-item-8468'><a class="mega-menu-link" href="https://www.cysec.com/edge-computing/">Edge Computing</a></li><li class='mega-menu-item mega-menu-item-type-post_type mega-menu-item-object-page mega-menu-item-5272' id='mega-menu-item-5272'><a class="mega-menu-link" href="https://www.cysec.com/discover-arca/space/">Space</a></li></ul> </li><li class='mega-menu-item mega-menu-item-type-post_type mega-menu-item-object-page mega-align-bottom-left mega-menu-flyout mega-menu-item-6990' id='mega-menu-item-6990'><a class="mega-menu-link" href="https://www.cysec.com/innovation-page-cysec/" tabindex="0">Innovation</a></li><li class='mega-menu-item mega-menu-item-type-custom mega-menu-item-object-custom mega-menu-item-has-children mega-align-bottom-left mega-menu-flyout mega-menu-item-6026' id='mega-menu-item-6026'><a class="mega-menu-link" href="#" aria-expanded="false" tabindex="0">Resources<span class="mega-indicator"></span></a> <ul class="mega-sub-menu"> <li class='mega-menu-item mega-menu-item-type-post_type mega-menu-item-object-page mega-menu-item-2759' id='mega-menu-item-2759'><a class="mega-menu-link" href="https://www.cysec.com/news/">Blog</a></li><li class='mega-menu-item mega-menu-item-type-custom mega-menu-item-object-custom mega-menu-item-6259' id='mega-menu-item-6259'><a class="mega-menu-link" href="https://resources.cysec.com/documentation">Documentation</a></li><li class='mega-menu-item mega-menu-item-type-post_type mega-menu-item-object-page mega-menu-item-6025' id='mega-menu-item-6025'><a class="mega-menu-link" href="https://www.cysec.com/discover-arca/video-library/">Video library</a></li><li class='mega-menu-item mega-menu-item-type-custom mega-menu-item-object-custom mega-menu-item-6070' id='mega-menu-item-6070'><a class="mega-menu-link" href="https://resources.cysec.com/press-release">Media Release</a></li></ul> </li><li class='mega-menu-item mega-menu-item-type-custom mega-menu-item-object-custom mega-menu-item-has-children mega-align-bottom-left mega-menu-flyout mega-menu-item-4631' id='mega-menu-item-4631'><a class="mega-menu-link" href="#" aria-expanded="false" tabindex="0">About Us<span class="mega-indicator"></span></a> <ul class="mega-sub-menu"> <li class='mega-menu-item mega-menu-item-type-post_type mega-menu-item-object-page mega-menu-item-5650' id='mega-menu-item-5650'><a class="mega-menu-link" href="https://www.cysec.com/about-us/">Who we are</a></li><li class='mega-menu-item mega-menu-item-type-post_type mega-menu-item-object-page mega-menu-item-7103' id='mega-menu-item-7103'><a class="mega-menu-link" href="https://www.cysec.com/team/">Team</a></li><li class='mega-menu-item mega-menu-item-type-post_type mega-menu-item-object-page mega-menu-item-4613' id='mega-menu-item-4613'><a class="mega-menu-link" href="https://www.cysec.com/career/">Career</a></li></ul> </li><li class='mega-menu-item mega-menu-item-type-custom mega-menu-item-object-custom mega-align-bottom-left mega-menu-flyout mega-menu-item-6926' id='mega-menu-item-6926'><a class="mega-menu-link" href="https://auth.docs.cysec.com/" tabindex="0">Login</a></li></ul></div> </nav> </div> <div class="col-lg-2 d-flex align-items-center"> <div class="button-demo"> <a class="link-blue" href="/starlink/">Starlink</a> </div> </div> </div> </div> </header> <div class="container page"><div class="wpb-content-wrapper"><div data-vc-full-width="true" data-vc-full-width-init="false" class="vc_row wpb_row vc_row-fluid header vc_custom_1636993197944 vc_row-has-fill vc_row-o-content-middle vc_row-flex"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_row wpb_row vc_inner vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div><div class="wpb_column vc_column_container vc_col-sm-8"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element" > <div class="wpb_wrapper"> <h1 style="text-align: center;">What is confidential computing?</h1> </div> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div></div></div></div></div></div><div class="vc_row-full-width vc_clearfix"></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-1"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element" > <div class="wpb_wrapper"> <p>As the <strong>digital transformation</strong> continues to accelerate around the globe, security and privacy have struggled to keep pace.</p> <p>Encryption only goes so far. It can prevent unauthorized eyes’ viewing and using sensitive data while it’s in storage and during transmission. But while that data is being processed in a CPU – “<strong>in use</strong>” &#8212; it is vulnerable, because it’s not encrypted during that time. Thwarted by encryption, hackers are now focusing their efforts on breaching data during this time, when it’s exposed.</p> <p>Digitizing alone isn’t enough to transform business processes in today’s privacy-focused world. Encryption technologies, too, need transforming. For a growing number of enterprises, confidential computing is <strong>bridging the encryption gap</strong>.</p> </div> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-1"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div></div><div class="vc_row wpb_row vc_row-fluid padding-top-0 padding-bottom-0"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner vc_custom_1636538750785"><div class="wpb_wrapper"><div class="vc_row wpb_row vc_inner vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-1"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element" > <div class="wpb_wrapper"> <h3><strong>Encryption: An ancient technique</strong></h3> <p>Encoded text and invisible ink have kept messages private for thousands of years, dating back at least as far as the Roman Empire. During World War II, for instance, the stage star Josephine Baker smuggled information written in invisible ink on her sheet music to Resistance leaders.</p> <p>Cryptography is a given in any situation involving secrecy, such as information passed during wartime.</p> <p>Encryption works in much the same way. Your assets are “invisible” – or, at least, indecipherable &#8212; while it sits in the cloud or your data center, as well as while it’s traveling through the cybersphere.</p> <p>But the moment any message is decrypted, it becomes visible. The user, whether a person or an application, can see it. So can anyone or anything looking over the user’s virtual shoulder &#8212; a hacker, perhaps, or malware lurking in your system.</p> <h3><strong>The </strong><strong>new kid on the security block</strong></h3> <p>With an expected compound annual<strong> growth rate of up to <a href="https://confidentialcomputing.io/wp-content/uploads/sites/85/2021/10/Everest_Group_-_Confidential_Computing_-_The_Next_Frontier_in_Data_Security_-_2021-10-19.pdf"> 96.5% thought 2026</a></strong>, confidential computing is poised to become one of the hottest trends in cybersecurity, especially in high-risk sectors including <strong>finance and healthcare</strong>.</p> <p>Consumers’ and regulators’ growing focus on data privacy is one reason why companies are embracing confidential computing. The near-ubiquitous technology shift from on-premises data centers to cloud environments and to the edge is another.</p> <p>And then there’s the high, and continually rising, cost of breaches: from 2020 to 2021, the cost of a data breach, on average, rose from $3.86 million USD to $4.24 million USD – the most in 17 years, according to a <a href="https://www.ibm.com/security/data-breach">survey</a> of 17 countries by the Ponemon Institute.</p> <h3><strong>Confidential computing explained</strong></h3> <p>Confidential computing puts the “confidential” back into computing, where it belongs – and where it used to be when we kept our files and data on the company’s premises.</p> <p>Today, much of that information sits in the cloud. Without firewalls or physical barriers to thwart intruders, running workloads and storing data in the cloud can make it more vulnerable to unauthorized access. Yes, there are ways to secure cloud environments, but weaknesses creep in: coding errors, unsecure passwords, and other problems.</p> <p><strong>Encryption</strong> is key to protecting our in-cloud data, but that method has long had weak spots, too. Until now, encryption has worked only on data “in transit,” or en route from one device or environment to another; or in storage (“at rest”). While data was “in use,” or being processed, it could not be encrypted, or the user wouldn’t be able to see it.</p> <p>Attackers exploit this vulnerability using a variety of <a href="https://confidentialcomputing.io/wp-content/uploads/sites/85/2021/03/confidentialcomputing_outreach_whitepaper-8-5x11-1.pdf">techniques</a>:</p> <ul> <li><strong>CPU-side-channel attacks</strong>, in which malicious actors <a href="https://therecord.media/new-side-channel-attack-targets-the-cpu-ring-bus-for-the-first-time/">observe</a> a computer processor’s operations to unlock <a href="https://www.sciencedirect.com/topics/computer-science/side-channel-attack">encryption keys</a>, passwords, and other security algorithms that they can use to gain unauthorized access to data</li> <li><strong>Malware injection</strong> to control systems, exfiltrate data from them, or hold them hostage</li> <li><strong>Memory scraping</strong>, in which malware extracts all the contents of <a href="https://us-cert.cisa.gov/ncas/alerts/TA14-002A">point-of-sale systems’</a> memory and intercepts credit card data while it’s being processed and transmitted. One widely known example is the December 2013 Target breach, which affected as many as 40 million cardholders.</li> </ul> <p>Confidential computing uses encryption to protect data even while it’s in use or being processed. Rather than encoding the data per se, confidential computing sequesters it in a Trusted Execution Environment (TEE) that requires a secret code, or encryption key, to enter.</p> <p>And if an unauthorized viewer should get the key? The best confidential computing uses “zero-trust” protocols to authenticate the user, and blocks those who don’t fit the criteria from unlocking the data.</p> <h3><strong>Keep data secure: the Trusted Execution Environment (TEE) </strong></h3> <p>TEEs work as a kind of invisibility cloak for data. Co-processors within a main processor, TEEs are secured via encryption keys.<strong> Various forms of authentication</strong> ensure that only users or applications equipped with the proper authentication code can access the information within.</p> <p>Even after the application or user has gained access, the data and code loaded in the TEE remain invisible to everyone and everything outside this TEE, including the cloud provider, virtual machines, and operating systems.</p> <p>TEEs protect all three elements essential to data security:</p> <ul> <li><strong>Data confidentiality</strong>: Unauthorized entities cannot view data in use within the TEE.</li> <li><strong>Data integrity: </strong>Unauthorized entities cannot add, remove, or alter data in use within the TEE.</li> <li><strong>Code integrity: </strong>Unauthorized entities cannot add, remove, or alter code executing in the TEE.</li> </ul> <h3><strong>How confidential computing is used</strong></h3> <p>Every industry that processes sensitive information such as employee, client and customer data; proprietary product design; medical records; auditing and accounting records; payment records; and other limited-access data is a candidate for CC. Use cases include:</p> <ul> <li><strong>Blockchain. </strong>Enclaves are useful for <a href="https://www.sciencedirect.com/science/article/pii/S2405959520301909">permissioned blockchains</a> by allowing nodes participating in the network to verify &#8220;secret&#8221; content, but without having the right to view this content in clear.</li> <li><strong>Data sharing.</strong> Collaboration among enterprises can’t happen without data sharing, often of private or regulated information, such as, in healthcare, sharing of clinical trial and <a href="https://www.cdisc.org/standards/real-world-data">Real World Data</a>, or observational data that healthcare providers collect during their routine clinical practice. Encryption conceals that data while it’s en route from one enterprise to another; confidential computing keeps it secure while it’s being viewed and processed.</li> <li><strong>Multi-party analytics.</strong> Analyzing data from many sources provides superior results. For example, when banks pool their data they can more easily spot fraud; scientists can get better research results; and marketers can better understand what customers want and how better serve them. <a href="https://www.forbes.com/sites/bernardmarr/2019/11/15/what-is-homomorphic-encryption-and-why-is-it-so-transformative/?sh=74d4e5097e93">Homomorphic encryption</a> allows analytical computations to be performed on encrypted data. While this technique is already reducing the risk of exposing sensitive data during analysis, confidential computing allows a faster and more scalable solution for large datasets by protecting the processing of unencrypted plain data.</li> <li><strong>Edge and internet-of-things (IOT) devices. </strong>Using confidential computing in IoT and edge devices as well as in back-end systems means that the data being communicated back and forth can’t be tampered with, which helps to ensure smooth functioning of autonomous vehicles and other edge-processing technologies.</li> <li><strong>Secure intellectual property. </strong>Confidential computing can be used to protect intellectual property as well as data privacy. It can secure code and the inner workings of entire applications. While data security is always a top priority, proprietary program methods can be just as valuable. This is especially true when a process is critical to increasing an organization&#8217;s efficiency or providing a service that no one else can provide. The company can use confidential computing in the cloud without fear of a competitor’s stealing a key component of its offering.</li> <li><strong>Artificial intelligence (AI) and machine learning (ML) modeling. </strong>To train AI and ML. you need data. Lots and lots of data. Data should be secured throughout training, whether the information is aggregated in one location or, in the case of federated learning, among different nodes. Confidential computing is probably the next big thing to protect these datasets and the business logic.</li> </ul> <h3><strong>What’s next: How to prepare for the confidential computing revolution</strong></h3> <p>Gartner says that <a href="https://www.gartner.com/en/newsroom/press-releases/2021-11-10-gartner-says-cloud-will-be-the-centerpiece-of-new-digital-experiences"><strong>85% of organizations will be &#8220;cloud-first&#8221;</strong> by 2025</a>. Migrating to the cloud means that companies no longer own the infrastructure, inherently increasing the risk of exposure since it cannot be directly controlled by them. Confidential computing removes this barrier, empowering organizations to protect their workloads and assets, even in public clouds.</p> <p>Confidential computing is catching fire among a growing community of tech companies and tech users, thanks in part to the <strong><a href="https://confidentialcomputing.io/">Confidential Computing Consortium</a></strong>. Formed in 2019 by the <a href="https://www.linuxfoundation.org/press-release/new-cross-industry-effort-to-advance-computational-trust-and-security-for-next-generation-cloud-and-edge-computing/">Linux Foundation</a>, which is dedicated to open-source technologies, this open-source group of technology companies – including <a href="https://www.cysec.com/">CYSEC</a> &#8212; works together to develop, adopt, and promote TEE technologies and standards. Other members include Google, Microsoft, and Intel.</p> <p>Joining the consortium is a great way to get ahead of the confidential computing curve – it’s a smart measure to prepare for the day when confidential computing will be expected of every organization. Other measures include</p> <ul> <li><strong>Think ahead</strong>: Begin developing a plan for implementing confidential computing in your enterprise. Which applications access sensitive information? Prepare now to encode them for processing information within a TEE.</li> <li><strong>Train your staff. </strong>The cybersecurity talent gap is already vast; introducing a new technology will only exacerbate the shortage. Take steps now to train your cyber teams in confidential computing.</li> <li><strong>Find your partners. </strong>No enterprise is an island. Rather than trying to re-invent the security wheel and implement confidential computing yourself, your best bet is to form partnerships with service providers and technology companies who can help you make the transition to confidential computing smooth and disruption-free.</li> </ul> <h3><strong>A tried-and-true confidential computing solution</strong></h3> <p><strong><a href="https://www.cysec.com/arca/">ARCA</a></strong> is a trusted OS with a hardware-based TEE that protects data in all its states – at rest, in transit, <em>and </em>in use. ARCA works in all environments including data centers, cloud environments, and edge technologies. It provides <strong>encrypted enclaves</strong>,  enabling a broader migration of data and applications on untrusted digital infrastructures. ARCA trusted OS provides the missing link in the chain of data protection.</p> <p>Companies including <a href="https://www.cysec.com/cases-studies/astrocast/">Astrocast</a> and <a href="https://www.cysec.com/cases-studies/metaco/">METACO</a> already trust ARCA to keep their most sensitive information encrypted and secure from unauthorized access.</p> <p><a href="https://www.cysec.com/contact/"><strong>Contact us now</strong></a> to find out how you can make use of cutting-edge security technology.</p> </div> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-1"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div></div></div></div></div></div><div data-vc-full-width="true" data-vc-full-width-init="false" class="vc_row wpb_row vc_row-fluid vc_custom_1622106940926 vc_row-has-fill"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div></div><div data-wpr-lazyrender="1" class="vc_row-full-width vc_clearfix"></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element" > <div class="wpb_wrapper"> <h2 style="text-align: center;">Latest Industry News</h2> </div> </div> <div class='events slider event-slider'><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2025/03/the-crucial-role-of-root-of-trust-copy-10-1.jpg);'></div><div class='title-contenu'><div class='title'>Securing the AI Frontier: Protecting Models and Inferences in Untrusted Environments</div><div class='contenu'>Discover how ARCA Trusted OS protects AI models and inference processe...<a href='https://www.cysec.com/securing-ai-frontier/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2025/02/the-crucial-role-of-root-of-trust-copy-11.png);'></div><div class='title-contenu'><div class='title'>CYSEC wins contract with U-Space to provide end-to-end security to smallsat constellations</div><div class='contenu'>U-Space, a French company manufacturing small satellites based in Toul...<a href='https://www.cysec.com/cysec-wins-contract-with-u-space/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2025/02/the-crucial-role-of-root-of-trust-copy-10.jpg);'></div><div class='title-contenu'><div class='title'>How to securely run a AI-based service on a third-party infrastructure</div><div class='contenu'>Learn how CYSEC protects AI models and sensitive data in the cloud usi...<a href='https://www.cysec.com/run-ai-based-service/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2025/02/the-crucial-role-of-root-of-trust-copy-9-1.jpg);'></div><div class='title-contenu'><div class='title'>Monitor ARCA Trusted OS with Fluentbit and Loki</div><div class='contenu'>Learn how CYSEC’s ARCA Trusted OS ensures secure monitoring of Linux...<a href='https://www.cysec.com/monitoring-secured-linux-os-arca-trusted/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2025/01/the-crucial-role-of-root-of-trust-copy-7-1.jpg);'></div><div class='title-contenu'><div class='title'>digital sovereignty</div><div class='contenu'>Explore the growing adoption of sovereign clouds for data sovereignty,...<a href='https://www.cysec.com/digital-sovereignty/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2024/12/the-crucial-role-of-root-of-trust-copy-7.jpg);'></div><div class='title-contenu'><div class='title'>ARTIFICIAL INTELLIGENCE SECURITY</div><div class='contenu'>Discover the critical challenges and solutions for securing Artificial...<a href='https://www.cysec.com/artificial-intelligence-security/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2024/12/the-crucial-role-of-root-of-trust-copy-6.jpg);'></div><div class='title-contenu'><div class='title'>Securely Extend Your VPN from Kubernetes Clusters to Isolated Edge Devices</div><div class='contenu'>Simplify the management of edge devices with CYSEC’s Linux-based mic...<a href='https://www.cysec.com/extend-vpn-kubernetes-edge-devices/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2024/10/the-crucial-role-of-root-of-trust-copy-5.jpg);'></div><div class='title-contenu'><div class='title'>CYSEC wins European Space Agency contract to protect satellite operations</div><div class='contenu'>CYSEC, the European company securing the space internet, has been awar...<a href='https://www.cysec.com/gstp/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2024/09/the-crucial-role-of-root-of-trust-copy-4.jpg);'></div><div class='title-contenu'><div class='title'>Viasat Working with European Cybersecurity Start-up on Satellite Encryption Services</div><div class='contenu'>Viasat, Inc. (NASDAQ: VSAT), a global leader in satellite communicatio...<a href='https://www.cysec.com/viasat-working-with-cysec-cybersecurity-start-up-on-satellite-encryption-services/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2024/09/protection-vm.jpg);'></div><div class='title-contenu'><div class='title'>Enhanced your control on the protection of your VMs in hosted private clouds</div><div class='contenu'>CYSEC has extended the capabilities of its infrastructure security sol...<a href='https://www.cysec.com/protection-of-vms/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2024/09/cognifog-platform-trust-os-capabilitis-1.jpg);'></div><div class='title-contenu'><div class='title'>ARCA Trusted OS Capabilities on the Cognifog Platform</div><div class='contenu'>In an increasingly connected world, the security and flexibility of sy...<a href='https://www.cysec.com/arca-trusted-os-capabilities-on-the-cognifog-platform/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2024/05/Untitled-copy-45.jpg);'></div><div class='title-contenu'><div class='title'>Securing the ever-evolving healthcare field &#8211; A CYSEC &#038; Implicity Partnership</div><div class='contenu'>In the ever-evolving healthcare field, the ability to collect and anal...<a href='https://www.cysec.com/securing-healthcare-field/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2024/05/the-crucial-role-of-root-of-trust-copy-1-1.jpg);'></div><div class='title-contenu'><div class='title'>i2CAT and CYSEC join forces to advance IoT security within COGNIFOG Project</div><div class='contenu'>i2CAT and CYSEC are thrilled to announce their collaboration within th...<a href='https://www.cysec.com/i2cat-and-cysec/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2024/05/Untitled-copy-44.jpg);'></div><div class='title-contenu'><div class='title'>Securing fleets of Container-based Edge Computing Devices</div><div class='contenu'>The deployment of a distributed system such as edge computing can be e...<a href='https://www.cysec.com/edge-computing-devices/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2024/03/Untitled-copy-40-1.jpg);'></div><div class='title-contenu'><div class='title'>Thuraya signs agreement with CYSEC</div><div class='contenu'>Thuraya Telecommunications Company (Thuraya), the mobile satellite ser...<a href='https://www.cysec.com/thuraya-cysec-agreement/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2024/04/Untitled-copy-43.jpg);'></div><div class='title-contenu'><div class='title'>CYSEC &#038; TIESSE : Strategic partnership for satellite links security</div><div class='contenu'>CYSEC and Tiesse SpA have established a strategic industrial partnersh...<a href='https://www.cysec.com/cysec-tiesse-strategic-partnership-for-satellite-links-security/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2024/03/Untitled-copy-40.jpg);'></div><div class='title-contenu'><div class='title'>Performance benchmark made within the SYNAPSE project</div><div class='contenu'>The impact that the security provided by ARCA Trusted OS, CYSEC’s ha...<a href='https://www.cysec.com/performance-benchmark/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2024/03/Untitled-copy-41.jpg);'></div><div class='title-contenu'><div class='title'>Qualification of the ARCA SATCOM solution</div><div class='contenu'>As part of studies conducted at CNES, CYSEC qualified its ARCA SATCOM ...<a href='https://www.cysec.com/arca-satcom-qualification/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2024/02/The-crucial-role-of-root-of-trust.jpg);'></div><div class='title-contenu'><div class='title'>Securing Edge Devices: The Crucial Role of Root of Trust in a Connected World</div><div class='contenu'>In the rapidly evolving landscape of IoT (Internet of Things) and edge...<a href='https://www.cysec.com/iot-edge/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2024/01/Untitled-copy-39.jpg);'></div><div class='title-contenu'><div class='title'>ARCAOS x86 compatibility with VM environments</div><div class='contenu'>CYSEC aims at offering the capacity to launch VMs running in Confident...<a href='https://www.cysec.com/arcaos-x86-compatibility-with-vm-environments/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/12/Untitled-copy-37.jpg);'></div><div class='title-contenu'><div class='title'>The SYNAPSE PROJECT</div><div class='contenu'>A snapshot of the collaborative SYNAPSE project between CYSEC and Look...<a href='https://www.cysec.com/synapse-project/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/12/Untitled-copy-36.jpg);'></div><div class='title-contenu'><div class='title'>CYSEC design choices and security maintenance processes</div><div class='contenu'>Sovereign cloud is emerging as a preferred choice for many organizatio...<a href='https://www.cysec.com/cysec-design/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/11/Untitled-copy-35.jpg);'></div><div class='title-contenu'><div class='title'>Unlocking the Potential of Remote Attestation: The Future of Trust and Security in a Connected World</div><div class='contenu'>The increasing prevalence of network-connected devices and the rise of...<a href='https://www.cysec.com/fluid-os-project/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/11/Untitled-copy-34.jpg);'></div><div class='title-contenu'><div class='title'>Protect your sovereign cloud with CYSEC solutions</div><div class='contenu'>Sovereign cloud is emerging as a preferred choice for many organizatio...<a href='https://www.cysec.com/sovereign-cloud/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/11/Untitled-copy-33.jpg);'></div><div class='title-contenu'><div class='title'>A technical deep dive in the secure boot of ARCA Trusted OS for Raspberry Pi 4B</div><div class='contenu'>ARCA Trusted OS is an Operating System (OS) that can run on Raspberry ...<a href='https://www.cysec.com/secure-boot/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/11/Untitled-copy-32.jpg);'></div><div class='title-contenu'><div class='title'>ESA PUSH</div><div class='contenu'>Within the PROGRAMME FOR USERBASE ENHANCEMENT (PUSH), ESA selected com...<a href='https://www.cysec.com/esa-push/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/11/Untitled-copy-27-1.jpg);'></div><div class='title-contenu'><div class='title'>Attested VM launch protocol : The result of CYSEC</div><div class='contenu'>CYSEC explored the attestation mechanisms offered by two different CPU...<a href='https://www.cysec.com/remote-attestation/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/11/Untitled-copy-27.jpg);'></div><div class='title-contenu'><div class='title'>ARCA SATLINK successfully tested in space</div><div class='contenu'>As part of a project for the European Space Agency - ESA our engineeri...<a href='https://www.cysec.com/arca-satlink-in-orbit/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/11/Untitled-copy-26.jpg);'></div><div class='title-contenu'><div class='title'>Linebreak and CYSEC join forces to securely unlock data in enterprise edge computing</div><div class='contenu'>enterprises need confidence when running their sensitive workloads in ...<a href='https://www.cysec.com/linebreak-and-cysec-announcement/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/10/Untitled-68.jpg);'></div><div class='title-contenu'><div class='title'>ARCAOS x86 on mini-servers</div><div class='contenu'>CYSEC continues its edge computing strategy expansion by qualifying tw...<a href='https://www.cysec.com/arca-on-mini-servers/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/10/Untitled-copy-28.jpg);'></div><div class='title-contenu'><div class='title'>USE CASE MIDEYE &#8211; CYSEC</div><div class='contenu'>Mideye and CYSEC have decided to work together to deliver a simple and...<a href='https://www.cysec.com/trusted-partner-iot/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/10/Untitled-copy-29.jpg);'></div><div class='title-contenu'><div class='title'>SixSq and CYSEC &#8211; A secure end to end edge computing solution</div><div class='contenu'>SixSq, an Ekinops company, and CYSEC are thrilled to announce their pa...<a href='https://www.cysec.com/secure-edge-computing-solution/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/09/Untitled-54.jpg);'></div><div class='title-contenu'><div class='title'>ARCAOS x86 compatibility on AWS</div><div class='contenu'>ARCA Trusted OS for x86 can now be deployed into AWS EC2 instances as ...<a href='https://www.cysec.com/on-aws/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/07/Untitled-copy-24.jpg);'></div><div class='title-contenu'><div class='title'>PostFinance and CYSEC</div><div class='contenu'>PostFinance, the fifth largest retail financial institution in Switzer...<a href='https://www.cysec.com/postfinance-and-confidential-computing/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/07/Untitled-39.jpg);'></div><div class='title-contenu'><div class='title'>Crosscon Project &#8211; Enhancing Security in Agricultural UAVs: The Power of Remote Attestation</div><div class='contenu'>One of the challenges faced by UAVs is their mobility and the potentia...<a href='https://www.cysec.com/crosscon-project/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/06/Untitled-36.jpg);'></div><div class='title-contenu'><div class='title'>Leveraging ChatGPT at the edge on a Raspberry Pi protected by Arca Trusted OS</div><div class='contenu'>In this use-case, ARCA Trusted OS protects the data stored on the Rasp...<a href='https://www.cysec.com/leveraging-chatgpt/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/06/SPACE-copy-2.jpg);'></div><div class='title-contenu'><div class='title'>A Trusted Environment at the Edge to Run AI Applications</div><div class='contenu'>With the adoption of AI at the edge, companies will expand their busin...<a href='https://www.cysec.com/secure-ai-applications/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/06/SPACE-copy-1.jpg);'></div><div class='title-contenu'><div class='title'>CYSAT</div><div class='contenu'>CYSEC has been organizing CYSAT, the biggest European event entirely d...<a href='https://www.cysec.com/cysat/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/05/vignette-raspberry.jpg);'></div><div class='title-contenu'><div class='title'>Secure your Raspberry Pi for industrial grade usage with ARCA Trusted OS</div><div class='contenu'>CYSEC is pleased to announce its new born ARCA Trusted OS for ARM spec...<a href='https://www.cysec.com/arca-trusted-os-for-raspberry-pi/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/04/SPACE.jpg);'></div><div class='title-contenu'><div class='title'>World’s first in-orbit cybersecurity demonstration at CYSAT</div><div class='contenu'>First offensive security demo on a flying satellite at CYSAT - In orde...<a href='https://www.cysec.com/worlds-first-in-orbit-cybersecurity-demonstration-at-cysat/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/03/TRANSPORT-LOGISTICS.jpg);'></div><div class='title-contenu'><div class='title'>Trusted and Secure Stream Analytics for Industrial IoT</div><div class='contenu'>Crosser, creator of a market leading low-code platform for stream anal...<a href='https://www.cysec.com/cysec-and-crosser-team-up/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/01/NIST-SP-800-190-1.jpg);'></div><div class='title-contenu'><div class='title'>What are the NIST SP 800-190 countermeasures in ARCA Trusted OS?</div><div class='contenu'>In addition to these recommendations specific to the host OS, ARCA Tru...<a href='https://www.cysec.com/the-nist-sp-800-190/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2023/01/Sighup-vignette.jpg);'></div><div class='title-contenu'><div class='title'>CYSEC AND SIGHUP PARTNER UP</div><div class='contenu'>SIGHUP is partnering with Cysec to provide a secure kubernetes-based c...<a href='https://www.cysec.com/cysec-and-sighup-partner-up/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/11/Slide-1-copy-1-3.png);'></div><div class='title-contenu'><div class='title'>Cysec and Ingram Micro new partnership</div><div class='contenu'>Ingram Micro Italy, a global leader in Technology and Supply Chain Ser...<a href='https://www.cysec.com/cysec-and-ingrammicro/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/11/CYSEC-and-SYNTHETICUS-team-up.jpg);'></div><div class='title-contenu'><div class='title'>Cysec and Syntheticus team up</div><div class='contenu'>“Cysec and Syntheticus team up to offer a solution enabling the migr...<a href='https://www.cysec.com/cysec-and-syntheticus-team-up/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/10/Aero41-and-CYSEC-event-scaled.jpg);'></div><div class='title-contenu'><div class='title'>SECURED FLEET OF DRONES</div><div class='contenu'>The drones industry is getting a lot of success in many verticals such...<a href='https://www.cysec.com/secured-fleet-of-drones/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/10/Feature-Image-2-M-seed-extention-scaled.jpg);'></div><div class='title-contenu'><div class='title'>CYSEC raises 2 million CHF with KARISTA’S Newspace Fund</div><div class='contenu'>CYSEC announces it has raised an additional €2m from Karista. The bu...<a href='https://www.cysec.com/cysec-raises-2-million/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/10/SECURITY-MEASURES-THAT-CYSEC-PROVIDES-scaled.jpg);'></div><div class='title-contenu'><div class='title'>How Cysec helps you leverage confidential VMs in public clouds</div><div class='contenu'>Based on the Confidential Computing Consortium, Confidential Computing...<a href='https://www.cysec.com/virtual-machine-public-cloud/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/08/avassa.jpg);'></div><div class='title-contenu'><div class='title'>For automated, scalable, and secure edge computing environments</div><div class='contenu'>LAUSANNE, SWITZERLAND. and STOCKHOLM, SWEDEN. Cysec, a software provid...<a href='https://www.cysec.com/cysec-and-avassa-partner-up-for-automated-scalable-and-secure-edge-computing-environments/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/07/How-to-migrate-your-sensitive-data-to-public-clouds-1.jpg);'></div><div class='title-contenu'><div class='title'>How to migrate your sensitive data to public clouds?</div><div class='contenu'>There is a clear trend to migrate data from organizations and companie...<a href='https://www.cysec.com/how-to-migrate-your-sensitive-data-to-public-clouds/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/06/Cysec-and-Zodia.jpg);'></div><div class='title-contenu'><div class='title'>Web3 and Secure Computing: Cysec case Study</div><div class='contenu'>Web3 refers to the next Internet generation, one that leverages public...<a href='https://www.cysec.com/custody-cysec-case-study/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/05/Key_IoT-1-scaled.jpg);'></div><div class='title-contenu'><div class='title'>CYSEC featured on cybernews!</div><div class='contenu'>Cysec has been mentioned, by the experts of cybernews.com, as one of t...<a href='https://www.cysec.com/featured-on-cybernews/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/06/Cysec-and-Katacontainer.jpg);'></div><div class='title-contenu'><div class='title'>Kata Containers: Cysec case Study</div><div class='contenu'>Cysec offers to run its orchestration platform with several runtimes s...<a href='https://www.cysec.com/kata-containers-cysec-cases-study/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/05/10_Taking_control_and_staying_in_touch.jpg);'></div><div class='title-contenu'><div class='title'>Spacebel and CYSEC team up on a contract with the European Space Agency (ESA)</div><div class='contenu'>The European Space Agency (ESA) awarded a contract to Spacebel (Prime ...<a href='https://www.cysec.com/spacebel-and-cysec-team-up/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/03/Cysec-interview.webp);'></div><div class='title-contenu'><div class='title'>&#8220;Because of geopolitical and economical pressures, company data protection is essential&#8221;</div><div class='contenu'>A talk with the CEO and Co-Founder of CYSEC<a href='https://www.cysec.com/patrick-trinkler-interview-data-protection-is-essential/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/03/img-bg-banner.jpg);'></div><div class='title-contenu'><div class='title'>Announcing Nicolas Chaillan and Octave Klaba as keynote speakers at CYSAT</div><div class='contenu'>The full event agenda is live<a href='https://www.cysec.com/nicolas-chaillan-octave-klaba-keynote-cysat/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/05/aurelien-clement-ducret-Cm8n6CIMZnY-unsplash-1.jpg);'></div><div class='title-contenu'><div class='title'>New Space Economy MOOC</div><div class='contenu'>An online course on the challenges of commercial space missions.<a href='https://www.cysec.com/new-space-economy-mooc/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/01/dynamic-wang-neUPDIEgHBc-unsplash-copy-scaled.jpg);'></div><div class='title-contenu'><div class='title'>Kata Containers: the ultimate workloads isolation</div><div class='contenu'>Introducing Kata Containers support<a href='https://www.cysec.com/kata-containers-the-ultimate-workloads-isolation/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/04/nkululeko-jonas-fSeKcdzeZTE-unsplash-copy-1.jpg);'></div><div class='title-contenu'><div class='title'>Cybersecurity for Enterprise Blockchain Solutions</div><div class='contenu'>Blueprint paper - Crypto Valley<a href='https://www.cysec.com/cybersecurity-for-enterprise-blockchain-solutions/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/05/nkululeko-jonas-fSeKcdzeZTE-unsplash-1.jpg);'></div><div class='title-contenu'><div class='title'>Cosimo Calcagno joins Board of Directors</div><div class='contenu'>New member of the Board of Directors and investor.<a href='https://www.cysec.com/cosimo-calcagno-joins-board-of-directors/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/02/Cloud-security-code-scaled.jpeg);'></div><div class='title-contenu'><div class='title'>Securely embrace the public cloud</div><div class='contenu'> Innovate faster, with security built in every step of the way.<a href='https://www.cysec.com/securely-embrace-the-public-cloud/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/01/joel-filipe-pyHPJEjUYHY-unsplash-1-scaled.jpg);'></div><div class='title-contenu'><div class='title'>Embedded KMS for IoT applications : the SEGWAY project</div><div class='contenu'>Filling the security gaps in cloud-edge integration.<a href='https://www.cysec.com/embedded-kms-for-iot-applications-the-segway-project/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/04/Screenshot-2021-07-20-at-14.13.17.png);'></div><div class='title-contenu'><div class='title'>CYSEC raises 4 million CHF in seed extension round</div><div class='contenu'>A funding to further its growth in digital assets and edge computing.<a href='https://www.cysec.com/seed-extension/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2022/01/PC-with-locker.png);'></div><div class='title-contenu'><div class='title'>Protecting data: glossary of an industry</div><div class='contenu'>Every industry has its own vocabulary and cybersecurity is no exceptio...<a href='https://www.cysec.com/protecting-data-glossary-of-an-industry/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/12/imgonline-com-ua-Color-filter-9rAELLTXJifJ-2.jpg);'></div><div class='title-contenu'><div class='title'>Why cybersecurity is too important to get lost in space</div><div class='contenu'>As the race to space takes flight, ARCA is ready for launch. <a href='https://www.cysec.com/why-cybersecurity-is-too-important-to-get-lost-in-space/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/12/Cheistmas-visual-2021-ball-coporate.jpg);'></div><div class='title-contenu'><div class='title'>2021 in review</div><div class='contenu'>Wrapping up yet another special year, but with great achievements.<a href='https://www.cysec.com/2021-in-review/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/12/SocialCard_4.jpg);'></div><div class='title-contenu'><div class='title'>Hack CYSAT: Europe’s first satellite hack</div><div class='contenu'>Calling for ethical hackers to hack a flying satellite.<a href='https://www.cysec.com/hack-cysat-europes-first-satellite-hack/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/06/ricardo-gomez-angel-X1-enlM3ibM-unsplash-scaled.jpg);'></div><div class='title-contenu'><div class='title'>Protecting health data on public cloud with HOSTEUR &#038; CYSEC</div><div class='contenu'>Improving the cryptographic key exchange protocol to ensure end-to-end...<a href='https://www.cysec.com/hosteur-protecting-health-data-on-public-cloud/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/11/Cloud-magnifying-glass-with-analytics-data-scaled.jpeg);'></div><div class='title-contenu'><div class='title'>What is confidential computing?</div><div class='contenu'>The new kid on the security block<a href='https://www.cysec.com/what-is-confidential-computing/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/11/Visual-CYSEC-ESA-govsatcom-scaled.jpeg);'></div><div class='title-contenu'><div class='title'>CYSEC wins European Space Agency contract to protect governmental data</div><div class='contenu'>Improving the cryptographic key exchange protocol to ensure end-to-end...<a href='https://www.cysec.com/cysec-wins-european-space-agency-contract-to-protect-governmental-data/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/09/Screenshot-2021-06-07-at-16.29.21.png);'></div><div class='title-contenu'><div class='title'>Confidential computing with CYSEC ARCA &#038; AMD-SEV [WHITEPAPER]</div><div class='contenu'>Whitepaper on how CYSEC ARCA leverage AMD-SEV <a href='https://www.cysec.com/cysec-arca-amd-sev-whitepaper/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/07/Screenshot-2021-07-14-at-12.28.19.png);'></div><div class='title-contenu'><div class='title'>Differential power analysis on SIKE &#8211; part 2</div><div class='contenu'>Power analysis attack on SIKE in a semi-static setting <a href='https://www.cysec.com/differential-power-analysis-on-sike-part-2/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/07/Screenshot-2021-07-08-at-12.45.06.png);'></div><div class='title-contenu'><div class='title'>Differential power analysis on SIKE &#8211; part 1</div><div class='contenu'>An introduction to isogeny-based cryptography <a href='https://www.cysec.com/differential-power-analysis-on-sike-part-1/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/03/Screenshot-2021-06-07-at-10.59.35.png);'></div><div class='title-contenu'><div class='title'>CYSEC partners with D-Orbit</div><div class='contenu'>Fly end-to-end cybersecurity for commercial space missions<a href='https://www.cysec.com/cysec-partners-with-d-orbit/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/06/Screenshot-2021-06-07-at-14.15.31.png);'></div><div class='title-contenu'><div class='title'>CYSEC partners with armasuisse Cyber Defence Campus</div><div class='contenu'>Protecting the data broadcasted by satellite internet providers <a href='https://www.cysec.com/cysec-partners-with-armasuisse-cyber-defence-campus/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/06/Screenshot-2021-06-23-at-12.57.10.png);'></div><div class='title-contenu'><div class='title'>Triton Malware Attack</div><div class='contenu'>Attack targeting Industrial Control System (ICS) <a href='https://www.cysec.com/triton-malware-attack/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/06/Screenshot-2021-06-15-at-10.02.26.png);'></div><div class='title-contenu'><div class='title'>CYSEC introduces CYSEC LAB</div><div class='contenu'>A security evaluation lab <a href='https://www.cysec.com/cysec-sa-introduces-cysec-lab/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/06/Screenshot-2021-06-07-at-14.15.31.png);'></div><div class='title-contenu'><div class='title'>CYSEC SA introduces CYSEC ARCA Trusted OS</div><div class='contenu'>Secure Sensitive Data and Open the Door to Collaboration<a href='https://www.cysec.com/cysec-sa-introduces-cysec-arca-trusted-os/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/06/Screenshot-2021-06-02-at-17.00.00.png);'></div><div class='title-contenu'><div class='title'>Eureka program support granted for DiCoQuaNet project</div><div class='contenu'>A Distributed Computing over a Quantum-Secure Network<a href='https://www.cysec.com/eureka-program-support-granted-for-dicoquanet-project/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/06/Screenshot-2021-06-07-at-10.25.54.png);'></div><div class='title-contenu'><div class='title'>Happy Three-Year Anniversary to CYSEC!</div><div class='contenu'>Celebrating three amazing years <a href='https://www.cysec.com/happy-three-year-anniversary-to-cysec/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/05/Screenshot-2021-06-07-at-10.31.54.png);'></div><div class='title-contenu'><div class='title'>CYSEC joins the GAIA-X Space initiative</div><div class='contenu'>The next generation of Europe’s data infrastructure<a href='https://www.cysec.com/cysec-joins-the-gaia-x-space-initiative/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/03/Screenshot-2021-06-07-at-10.56.07.png);'></div><div class='title-contenu'><div class='title'>Researchers and satellite start-ups meet</div><div class='contenu'>Discussing celestial cybersecurity<a href='https://www.cysec.com/researchers-and-satellite-start-ups-meet/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/03/Screenshot-2021-06-07-at-10.59.35.png);'></div><div class='title-contenu'><div class='title'>Il est trop facile de pirater un satellite et ça menace Internet</div><div class='contenu'>Cybersecurity in space and its importance<a href='https://www.cysec.com/il-est-trop-facile-de-pirater-un-satellite-et-ca-menace-internet/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/03/Screenshot-2021-06-07-at-11.03.54.png);'></div><div class='title-contenu'><div class='title'>La cybersécurité aussi dans lʹespace</div><div class='contenu'>Patrick Trinkler talking about the importance of cybersecurity<a href='https://www.cysec.com/la-cybersecurite-aussi-dans-l%ca%b9espace/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/03/Screenshot-2021-06-07-at-11.07.10.png);'></div><div class='title-contenu'><div class='title'>CYSAT&#8217;21 &#8211; kicking-off March 17TH</div><div class='contenu'>Cybersecurity for commercial space<a href='https://www.cysec.com/cysat21-kickingoff-march-17/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/03/Screenshot-2021-06-07-at-11.17.08.png);'></div><div class='title-contenu'><div class='title'>Security for Commercial Space: CYSAT’21 Pioneers Cyber Security Solutions</div><div class='contenu'>CYSAT’21 Pioneers Cyber Security Solutions<a href='https://www.cysec.com/security-for-commercial-space-cysat21-pioneers-cyber-security-solutions/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/03/Screenshot-2021-06-07-at-11.16.38.png);'></div><div class='title-contenu'><div class='title'>CYSEC &#8211; As Seen in BILANZ</div><div class='contenu'>CYSEC's journey to a secure operating system<a href='https://www.cysec.com/cysec-as-seen-in-bilanz/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/03/Screenshot-2021-06-07-at-11.29.20.png);'></div><div class='title-contenu'><div class='title'>CYSEC listed in the CV VC Top 50 report</div><div class='contenu'>Listed for the second time in a row<a href='https://www.cysec.com/cysec-listed-in-the-cvvc-top50-report/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/02/Screenshot-2021-06-07-at-11.34.35.png);'></div><div class='title-contenu'><div class='title'>Cybersecurity for smallsats</div><div class='contenu'>Five security concepts for smallsat operators to follow<a href='https://www.cysec.com/cybersecurity-for-smallsats-5-key-concepts-explained/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/01/Screenshot-2021-06-07-at-11.48.48.png);'></div><div class='title-contenu'><div class='title'>The European Champions Alliance partners up with CYSEC &#038; AP-Swiss</div><div class='contenu'>CYSAT'21: event dedicated to cyber risks in Space<a href='https://www.cysec.com/the-european-champions-alliance-partners-up-with-cysec-ap-swiss/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/05/Screenshot-2021-06-07-at-16.29.21.png);'></div><div class='title-contenu'><div class='title'>Patrick Nicolet Joins Board of Directors</div><div class='contenu'>Former Capgemini CTO, a new strategic entry <a href='https://www.cysec.com/patrick-nicolet-joins-board-of-directors/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/12/Screenshot-2021-06-07-at-12.00.35.png);'></div><div class='title-contenu'><div class='title'>CYSEC wins Swiss Space Office contract</div><div class='contenu'>For a secure in-orbit satellite reconfiguration<a href='https://www.cysec.com/cysec-wins-swiss-space-office-contract/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/11/Screenshot-2021-06-07-at-12.03.08.png);'></div><div class='title-contenu'><div class='title'>CYSEC and AP-Swiss organize CYSAT’21</div><div class='contenu'>The first European event on cybersecurity in space<a href='https://www.cysec.com/cysec-and-apswiss-organize-cysat21/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/10/Screenshot-2021-06-07-at-13.13.33.png);'></div><div class='title-contenu'><div class='title'>Run Your Applications On Secure Enclaves</div><div class='contenu'>CYSEC partners with Kyos and joins a recognised network<a href='https://www.cysec.com/complete-modern-stack-for-application-secure-enclaves-with-cysecs-arca/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/03/Screenshot-2021-06-07-at-10.59.35.png);'></div><div class='title-contenu'><div class='title'>Let’s not make Newspace a paradise for hackers</div><div class='contenu'>Cyber threats in space and their consequences<a href='https://www.cysec.com/lets-not-make-newspace-a-paradise-for-hackers/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/10/Screenshot-2021-06-07-at-13.20.24.png);'></div><div class='title-contenu'><div class='title'>CYSEC selected for Tech4Trust acceleration program</div><div class='contenu'>Most innovative startups of the Lake Geneva region<a href='https://www.cysec.com/cysec-selected-for-tech4trust-acceleration-program/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/10/Screenshot-2021-06-07-at-13.35.43.png);'></div><div class='title-contenu'><div class='title'>Pryv and CYSEC launch an integrated solution</div><div class='contenu'>The personal data & consent management secured middleware<a href='https://www.cysec.com/pryv-and-cysec-launch-an-integrated-solution/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/10/Screenshot-2021-06-07-at-13.39.23.png);'></div><div class='title-contenu'><div class='title'>CYSEC at Forum EPFL</div><div class='contenu'>Startup day at SwissTech Convention Center<a href='https://www.cysec.com/cysec-at-forum-epfl/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/03/Screenshot-2021-06-07-at-11.29.20.png);'></div><div class='title-contenu'><div class='title'>CYSEC listed in the CV VC Top 50 report</div><div class='contenu'>Top 50 organizations in the Blockchain Technology sector<a href='https://www.cysec.com/cysec-listed-in-the-cv-vc-top-50-report/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/09/Screenshot-2021-06-07-at-13.48.22.png);'></div><div class='title-contenu'><div class='title'>SwissPKI Now Available On CYSEC ARCA</div><div class='contenu'>LibC Technologies and CYSEC launch a secured SwissPKI <a href='https://www.cysec.com/libc-technologies-and-cysec-launch-swisspki-on-arca/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/09/Screenshot-2021-06-07-at-13.54.26.png);'></div><div class='title-contenu'><div class='title'>CYSEC voted Best Security Startup</div><div class='contenu'>Ranking #62 in TOP100 Swiss Startup Award 2020<a href='https://www.cysec.com/cysec-voted-best-security-startup/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/08/Screenshot-2021-06-07-at-13.58.25.png);'></div><div class='title-contenu'><div class='title'>CYSEC partners up with Leaf Space</div><div class='contenu'>Offering end-to-end protection for satellites<a href='https://www.cysec.com/cysec-partners-up-with-leaf-space/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/03/Screenshot-2021-06-07-at-11.16.38.png);'></div><div class='title-contenu'><div class='title'>Confidential Edge Computing For IoT Security</div><div class='contenu'>Discover confidential edge computing<a href='https://www.cysec.com/an-introduction-to-confidential-edge-computing-for-iot-security/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/07/Screenshot-2021-06-07-at-16.26.05.png);'></div><div class='title-contenu'><div class='title'>CYSEC SA raises 500’000 Swiss francs from FIT</div><div class='contenu'>CYSEC rewarded for its cybersecurity innovative solution<a href='https://www.cysec.com/cysecsa-raises-50000-swiss-francs-from-fit/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/05/Screenshot-2021-06-07-at-16.29.21.png);'></div><div class='title-contenu'><div class='title'>CYSEC SA welcomes Howard Yu to its Advisory Board</div><div class='contenu'>Director of IMD’s Advanced Management Program <a href='https://www.cysec.com/cysecsa-welcomes-howard-yu-to-its-advisory-board/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/04/Screenshot-2021-06-07-at-16.36.45.png);'></div><div class='title-contenu'><div class='title'>The Things Industries partners with CYSEC</div><div class='contenu'>For a secure on-premises LoRaWAN network deployment<a href='https://www.cysec.com/the-things-industry-partners-with-cysec/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/04/Screenshot-2021-06-07-at-16.41.39.png);'></div><div class='title-contenu'><div class='title'>CYSEC wins European Space Agency contract</div><div class='contenu'>Protect ship tracking communications from cyber threats<a href='https://www.cysec.com/cysec-wins-european-space-agency-contract/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/03/Screenshot-2021-06-07-at-16.48.21.png);'></div><div class='title-contenu'><div class='title'>Next generation security platform</div><div class='contenu'>Safeguard critical applications and sensitive digital assets<a href='https://www.cysec.com/next-generation-security-platform/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/03/Screenshot-2021-06-07-at-16.50.19.png);'></div><div class='title-contenu'><div class='title'>CYSEC joins the LoRa Alliance</div><div class='contenu'>Foster cybersecurity adoption in IoT<a href='https://www.cysec.com/cysec-joins-the-lora-alliance/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/05/Screenshot-2021-06-07-at-16.29.21.png);'></div><div class='title-contenu'><div class='title'>CYSEC SA welcomes Pascal Junod to its Advisory Board</div><div class='contenu'>Expert in applied cryptography and software protection<a href='https://www.cysec.com/cysec-sa-welcomes-pascal-junod-to-its-advisory-board/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/01/Screenshot-2021-06-08-at-13.54.29.png);'></div><div class='title-contenu'><div class='title'>Cloud Constellation Corporation partners with CYSEC</div><div class='contenu'>To deliver enterprise-ready Global Private Cloud Services<a href='https://www.cysec.com/cloud-constellation-corporation-partners-with-cysec/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/01/Screenshot-2021-06-08-at-13.55.36.png);'></div><div class='title-contenu'><div class='title'>CYSEC partners with Build38</div><div class='contenu'>Facilitate secure deployment of Mobile App and Fraud Protection<a href='https://www.cysec.com/cysec-partners-with-build38/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2019/12/Screenshot-2021-06-08-at-13.55.51.png);'></div><div class='title-contenu'><div class='title'>CYSEC secures the smart heaters of Lancey Energy Storage</div><div class='contenu'>Protecting IoT ecosystems with CYSEC ARCA<a href='https://www.cysec.com/cysec-secures-the-smart-haters-of-lancey-energy-storage/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2019/12/Screenshot-2021-06-08-at-13.56.10.png);'></div><div class='title-contenu'><div class='title'>CYSEC to secure Astrocast global IoT network</div><div class='contenu'>End-to-end security of IoT Communication of 80 nanosatellites<a href='https://www.cysec.com/cysec-to-secure-astrocast-global-iot-network/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2019/11/Screenshot-2021-06-08-at-13.56.43.png);'></div><div class='title-contenu'><div class='title'>CYSEC wins CSO 2019 AWARD</div><div class='contenu'>Innovation in cybersecurity of the year<a href='https://www.cysec.com/cysec-wins-cso-2019-award/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2019/10/Screenshot-2021-06-08-at-13.57.10.png);'></div><div class='title-contenu'><div class='title'>Global Challenge Winner 2019</div><div class='contenu'>Winner of the ITU Innovations challenges<a href='https://www.cysec.com/global-challenge-winner-2019/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2019/09/Screenshot-2021-06-08-at-13.57.27.png);'></div><div class='title-contenu'><div class='title'>Insight SiP and CYSEC SA awarded Eurostars grant</div><div class='contenu'>Secure communications solution for medical IoT devices<a href='https://www.cysec.com/insight-sip-and-cysecsa-awarded-eurostars-grant/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2019/09/Screenshot-2021-06-08-at-15.33.42.png);'></div><div class='title-contenu'><div class='title'>Singapore festival</div><div class='contenu'>Swiss fintechs to showcase innovative solutions<a href='https://www.cysec.com/singapore-festival/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2019/09/Screenshot-2021-06-08-at-15.33.55.png);'></div><div class='title-contenu'><div class='title'>CYSEC at Deftech, November 2019</div><div class='contenu'>Discussing the Swiss ecosystem for defense innovation<a href='https://www.cysec.com/cysec-at-deftech-november-2019/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/10/Screenshot-2021-06-07-at-13.39.23.png);'></div><div class='title-contenu'><div class='title'>Come and meet us in October at Forum EPFL</div><div class='contenu'>Start Up Day<a href='https://www.cysec.com/come-and-meet-us-in-october-at-forum-epfl/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2019/07/Screenshot-2021-06-08-at-15.34.10.png);'></div><div class='title-contenu'><div class='title'>CYSEC selected by IMD in startup competition</div><div class='contenu'>IMD offers support to promising Swiss startups <a href='https://www.cysec.com/cysec-selected-by-imd-in-startup-competition/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2019/06/Screenshot-2021-06-08-at-15.34.24.png);'></div><div class='title-contenu'><div class='title'>New Solution For Secure Digital Asset Management</div><div class='contenu'>Swiss-made crypto asset management ecosystem<a href='https://www.cysec.com/metaco-algotrader-and-cysec-announce-strategic-partnership/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2019/05/Screenshot-2021-06-08-at-15.34.54.png);'></div><div class='title-contenu'><div class='title'>CYSEC selected to take part in ESA’s Business Incubation Programme</div><div class='contenu'>Program dedicated to startups innovating in space<a href='https://www.cysec.com/cysec-selected-to-take-part-in-esas-business-incubation-programme/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2019/05/Screenshot-2021-06-08-at-15.35.07.png);'></div><div class='title-contenu'><div class='title'>REGDATA SA &#038; CYSEC SA announce strategic alliance</div><div class='contenu'>Setting secure foundation and use of applications<a href='https://www.cysec.com/regdata-sa-cysec-sa-announce-strategic-alliance/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2019/03/Screenshot-2021-06-08-at-15.35.20.png);'></div><div class='title-contenu'><div class='title'>Sysmosoft SA &#038; CYSEC SA announce strategic alliance</div><div class='contenu'>Setting secure foundations of cryptographic technologies<a href='https://www.cysec.com/sysmosoft-sa-cysec-sa-announce-strategic-alliance/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2019/02/Screenshot-2021-06-08-at-15.35.34.png);'></div><div class='title-contenu'><div class='title'>GEOSATIS and CYSEC announce technological partnership</div><div class='contenu'>For secure deployment and operation of IoT solution <a href='https://www.cysec.com/geosatis-and-cysec-announce-technological-partnership/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/05/Screenshot-2021-06-07-at-16.29.21.png);'></div><div class='title-contenu'><div class='title'>CYSEC raises 1.5 million Swiss francs</div><div class='contenu'>To accelerate the deployment of innovative data security solutions<a href='https://www.cysec.com/cysec-raises-1-5-million-swiss-francs/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2020/07/Screenshot-2021-06-07-at-16.26.05.png);'></div><div class='title-contenu'><div class='title'>CYSEC receives a FIT seed loan of CHF 100’000</div><div class='contenu'>To finalise product development and perform market validation<a href='https://www.cysec.com/cysec-receives-a-fit-seed-loan-of-chf-100000/' class='yellow'>Read more ></a></div></div></div><div class='event carousel-cell'><div class='image' style='background-image: url(https://www.cysec.com/wp-content/uploads/2021/06/Screenshot-2021-06-07-at-10.25.54.png);'></div><div class='title-contenu'><div class='title'>Swiss Fintech startups in NY</div><div class='contenu'>CYSEC selected to showcase ARCA in Venture Leaders roadshow<a href='https://www.cysec.com/swiss-fintech-startups-in-ny/' class='yellow'>Read more ></a></div></div></div></div></div></div></div></div> </div></div> <footer data-wpr-lazyrender="1" class="footer"> <div class="container"> <div class="row text-center"> <div class="col-lg-12"> <div> <div class="textwidget"><p><img loading="lazy" decoding="async" width="113" height="117" class="size-full wp-image-145 aligncenter logo" src="/wp-content/uploads/2021/04/logo-footer@2x.png" /></p> <div class="privacy"><a href="/privacy">PRIVACY</a><a href="/cookie-policy">Cookie policy</a><a href="/terms-and-conditions/ ">Terms and conditions</a></div> <div class="copyright">©2024 CYSEC All rights reserved</div> </div> </div> </div> </div> </div> </footer> <a href="https://www.cysec.com/contact/#contact_form_scroll" class="float"> <i class="far fa-envelope my-float fa-2x"></i> </a> <script type="text/javascript"> _linkedin_partner_id = "3975073"; window._linkedin_data_partner_ids = window._linkedin_data_partner_ids || []; window._linkedin_data_partner_ids.push(_linkedin_partner_id); </script><script type="text/javascript"> (function(l) { if (!l){window.lintrk = function(a,b){window.lintrk.q.push([a,b])}; window.lintrk.q=[]} var s = document.getElementsByTagName("script")[0]; var b = document.createElement("script"); b.type = "text/javascript";b.async = true; b.src = "https://snap.licdn.com/li.lms-analytics/insight.min.js"; s.parentNode.insertBefore(b, s);})(window.lintrk); </script> <noscript> <img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=3975073&fmt=gif" /> </noscript> <!-- GTM Container placement set to footer --> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-N4TXXH3" height="0" width="0" style="display:none;visibility:hidden" aria-hidden="true"></iframe></noscript> <!-- End Google Tag Manager (noscript) --><script type="text/javascript" id="leadin-script-loader-js-js-extra"> /* <![CDATA[ */ var leadin_wordpress = {"userRole":"visitor","pageType":"post","leadinPluginVersion":"11.2.9"}; /* ]]> */ </script> <script type="text/javascript" src="https://js.hs-scripts.com/9332937.js?integration=WordPress&amp;ver=11.2.9" id="leadin-script-loader-js-js"></script> <script type="text/javascript" id="rocket-browser-checker-js-after"> /* <![CDATA[ */ "use strict";var _createClass=function(){function defineProperties(target,props){for(var i=0;i<props.length;i++){var descriptor=props[i];descriptor.enumerable=descriptor.enumerable||!1,descriptor.configurable=!0,"value"in descriptor&&(descriptor.writable=!0),Object.defineProperty(target,descriptor.key,descriptor)}}return function(Constructor,protoProps,staticProps){return protoProps&&defineProperties(Constructor.prototype,protoProps),staticProps&&defineProperties(Constructor,staticProps),Constructor}}();function _classCallCheck(instance,Constructor){if(!(instance instanceof Constructor))throw new TypeError("Cannot call a class as a function")}var RocketBrowserCompatibilityChecker=function(){function RocketBrowserCompatibilityChecker(options){_classCallCheck(this,RocketBrowserCompatibilityChecker),this.passiveSupported=!1,this._checkPassiveOption(this),this.options=!!this.passiveSupported&&options}return _createClass(RocketBrowserCompatibilityChecker,[{key:"_checkPassiveOption",value:function(self){try{var options={get passive(){return!(self.passiveSupported=!0)}};window.addEventListener("test",null,options),window.removeEventListener("test",null,options)}catch(err){self.passiveSupported=!1}}},{key:"initRequestIdleCallback",value:function(){!1 in window&&(window.requestIdleCallback=function(cb){var start=Date.now();return setTimeout(function(){cb({didTimeout:!1,timeRemaining:function(){return Math.max(0,50-(Date.now()-start))}})},1)}),!1 in window&&(window.cancelIdleCallback=function(id){return clearTimeout(id)})}},{key:"isDataSaverModeOn",value:function(){return"connection"in navigator&&!0===navigator.connection.saveData}},{key:"supportsLinkPrefetch",value:function(){var elem=document.createElement("link");return elem.relList&&elem.relList.supports&&elem.relList.supports("prefetch")&&window.IntersectionObserver&&"isIntersecting"in IntersectionObserverEntry.prototype}},{key:"isSlowConnection",value:function(){return"connection"in navigator&&"effectiveType"in navigator.connection&&("2g"===navigator.connection.effectiveType||"slow-2g"===navigator.connection.effectiveType)}}]),RocketBrowserCompatibilityChecker}(); /* ]]> */ </script> <script type="text/javascript" id="rocket-preload-links-js-extra"> /* <![CDATA[ */ var RocketPreloadLinksConfig = {"excludeUris":"\/(?:.+\/)?feed(?:\/(?:.+\/?)?)?$|\/(?:.+\/)?embed\/|\/(index.php\/)?(.*)wp-json(\/.*|$)|\/refer\/|\/go\/|\/recommend\/|\/recommends\/","usesTrailingSlash":"1","imageExt":"jpg|jpeg|gif|png|tiff|bmp|webp|avif|pdf|doc|docx|xls|xlsx|php","fileExt":"jpg|jpeg|gif|png|tiff|bmp|webp|avif|pdf|doc|docx|xls|xlsx|php|html|htm","siteUrl":"https:\/\/www.cysec.com","onHoverDelay":"100","rateThrottle":"3"}; /* ]]> */ </script> <script type="text/javascript" id="rocket-preload-links-js-after"> /* <![CDATA[ */ (function() { "use strict";var r="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},e=function(){function i(e,t){for(var n=0;n<t.length;n++){var i=t[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(e,i.key,i)}}return function(e,t,n){return t&&i(e.prototype,t),n&&i(e,n),e}}();function i(e,t){if(!(e instanceof t))throw new TypeError("Cannot call a class as a function")}var t=function(){function n(e,t){i(this,n),this.browser=e,this.config=t,this.options=this.browser.options,this.prefetched=new Set,this.eventTime=null,this.threshold=1111,this.numOnHover=0}return e(n,[{key:"init",value:function(){!this.browser.supportsLinkPrefetch()||this.browser.isDataSaverModeOn()||this.browser.isSlowConnection()||(this.regex={excludeUris:RegExp(this.config.excludeUris,"i"),images:RegExp(".("+this.config.imageExt+")$","i"),fileExt:RegExp(".("+this.config.fileExt+")$","i")},this._initListeners(this))}},{key:"_initListeners",value:function(e){-1<this.config.onHoverDelay&&document.addEventListener("mouseover",e.listener.bind(e),e.listenerOptions),document.addEventListener("mousedown",e.listener.bind(e),e.listenerOptions),document.addEventListener("touchstart",e.listener.bind(e),e.listenerOptions)}},{key:"listener",value:function(e){var t=e.target.closest("a"),n=this._prepareUrl(t);if(null!==n)switch(e.type){case"mousedown":case"touchstart":this._addPrefetchLink(n);break;case"mouseover":this._earlyPrefetch(t,n,"mouseout")}}},{key:"_earlyPrefetch",value:function(t,e,n){var i=this,r=setTimeout(function(){if(r=null,0===i.numOnHover)setTimeout(function(){return i.numOnHover=0},1e3);else if(i.numOnHover>i.config.rateThrottle)return;i.numOnHover++,i._addPrefetchLink(e)},this.config.onHoverDelay);t.addEventListener(n,function e(){t.removeEventListener(n,e,{passive:!0}),null!==r&&(clearTimeout(r),r=null)},{passive:!0})}},{key:"_addPrefetchLink",value:function(i){return this.prefetched.add(i.href),new Promise(function(e,t){var n=document.createElement("link");n.rel="prefetch",n.href=i.href,n.onload=e,n.onerror=t,document.head.appendChild(n)}).catch(function(){})}},{key:"_prepareUrl",value:function(e){if(null===e||"object"!==(void 0===e?"undefined":r(e))||!1 in e||-1===["http:","https:"].indexOf(e.protocol))return null;var t=e.href.substring(0,this.config.siteUrl.length),n=this._getPathname(e.href,t),i={original:e.href,protocol:e.protocol,origin:t,pathname:n,href:t+n};return this._isLinkOk(i)?i:null}},{key:"_getPathname",value:function(e,t){var n=t?e.substring(this.config.siteUrl.length):e;return n.startsWith("/")||(n="/"+n),this._shouldAddTrailingSlash(n)?n+"/":n}},{key:"_shouldAddTrailingSlash",value:function(e){return this.config.usesTrailingSlash&&!e.endsWith("/")&&!this.regex.fileExt.test(e)}},{key:"_isLinkOk",value:function(e){return null!==e&&"object"===(void 0===e?"undefined":r(e))&&(!this.prefetched.has(e.href)&&e.origin===this.config.siteUrl&&-1===e.href.indexOf("?")&&-1===e.href.indexOf("#")&&!this.regex.excludeUris.test(e.href)&&!this.regex.images.test(e.href))}}],[{key:"run",value:function(){"undefined"!=typeof RocketPreloadLinksConfig&&new n(new RocketBrowserCompatibilityChecker({capture:!0,passive:!0}),RocketPreloadLinksConfig).init()}}]),n}();t.run(); }()); /* ]]> */ </script> <script type="text/javascript" src="https://www.cysec.com/wp-includes/js/hoverIntent.min.js?ver=1.10.2" id="hoverIntent-js"></script> <script type="text/javascript" src="https://www.cysec.com/wp-content/plugins/megamenu/js/maxmegamenu.js?ver=3.4.1" id="megamenu-js"></script> <script type="text/javascript" src="https://www.cysec.com/wp-content/plugins/megamenu-pro/assets/public.js?ver=2.2.7" id="megamenu-pro-js"></script> <script type="text/javascript" id="custom-main-js-extra"> /* <![CDATA[ */ var ajax_object = {"ajax_url":"https:\/\/www.cysec.com\/wp-admin\/admin-ajax.php"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.cysec.com/wp-content/themes/cysec-child/assets/js/main.js" id="custom-main-js"></script> <script type="text/javascript" src="https://www.cysec.com/wp-content/plugins/js_composer/assets/js/dist/js_composer_front.min.js?ver=8.0.1" id="wpb_composer_front_js-js"></script> <script></script> <!--<script> var tarteaucitronForceLanguage = 'en'; var tarteaucitronPrivacyUrl = 'https://www.cysec.com/privacy'; </script> <script type="text/javascript" src="https://www.cysec.com/wp-content/themes/cysec-child/assets/js/tarteaucitron/tarteaucitron.js"></script> <script type="text/javascript" src="https://www.cysec.com/wp-content/themes/cysec-child/assets/js/tarteaucitron/tarteaucitron-config.js?v=1.0"></script>--> </body> </html> <!-- This website is like a Rocket, isn't it? Performance optimized by WP Rocket. Learn more: https://wp-rocket.me - Debug: cached@1742984562 -->

Pages: 1 2 3 4 5 6 7 8 9 10