Register now for OC3, the premier event for confidential computing, on March 13 - free and online

Edgeless Systems blog


Welcome to our blog. In the Edgeless Systems blog, you can read about our products' latest features, use cases, insights into the confidential computing industry, experts' opinions, and much more.

Latest blog posts

Filter by

Blog OC3

OC3 2024 and the growth of confidential computing

Company

Insights

Secure 5G networks with confidential computing

Insights

Security

Terraform logo repeated multiple times

The always-encrypted Kubernetes now comes with a Terraform provider

Product

Confidential s3proxy

Product

How confidential computing and AI fit together

Insights

Reproducible builds for confidential computing

Product

Tutorial

The relationship between zero trust and confidential computing

Insights

Fundamentals

Security

The three levels of confidential computing

Insights

Fundamentals

Security

open source blog

Why and how companies do open source

Insights

How to setup Mattermost on the Kubernetes engine Constellation

Tutorial

mkosi

Constellation 💖 mkosi — Minimal TCB, tailor-made for measured boot

Product

What’s new in Constellation v2.2.0? AWS support, minimal OS images & Terraform integration!

Product

confidential computing & blockchain

Confidential computing will take blockchain to the next level of security

Insights

Bringing first-class support to SBOMs and attestations for Constellation containers

Security

Product

How is the performance of Constellation

How is the performance of Constellation, the always-encrypted Kubernetes, compared to AKS and GKE?

Product

Bring your own key (BYOK) was a lie!

Bring your own key (BYOK) was a lie!

Security

Insights

What’s new in Constellation v2.1.0? Mini Constellation, Terraform integration & Kubernetes v1.25 support!

Security

Product

My favorite tools to keep a zero vulnerabilities posture for Constellation

My favorite tools to keep a zero vulnerabilities posture for Constellation

Security

Product

Generating SBOMs for confidential Kubernetes is easier than you think!

Generating SBOMs for confidential Kubernetes is easier than you think!

Security

Product

Constellation has landed open source on GitHub and you can now have your own confidential Kubernetes. Finally, the public cloud becomes the safest place for your sensitive data.

Hi, open-source community, confidential Kubernetes is now on GitHub!

Product

Product

Confidential SaaS: A new security paradigm for software-as-a-service

Confidential SaaS: A new security paradigm for software-as-a-service

Insights

homomorphic encryption vs confidential computing blog.webp

The differences between Homomorphic Encryption (HE) and Confidential Computing (CC)

Insights

GDPR compliance in the public cloud with confidential computing

GDPR compliance in the public cloud with confidential computing

Insights

How to make your microservice architecture end-to-end confidential

How to make your microservice architecture end-to-end confidential

Product

Tutorial

Spotlight: Occlum

Spotlight: Occlum

Insights

Arm Veracruz

Spotlight: Arm Veracruz

Insights

EdgelessDB

Announcing EdgelessDB: The First Confidential Database

Product

We’re hosting the Open Confidential Computing Conference 2021!

Company

TensorFlow / MarbleRun

Confidential multi-stakeholder AI

Insights

How we built EGo

How we built EGo

Product

We raised €1.45m to build the open-source stack for confidential computing!

We raised €1.45m to build the open-source stack for confidential computing!

Company

MarbleRun now supports Occlum — even more confidential computing at scale

Company

Insights

EGo and MarbleRun

How to build and deploy confidential computing microservice applications with EGo & MarbleRun

Tutorial

Product

How we are losing control of our data… and how we will get it back!

Insights

Confidential computing — basics, benefits and use cases

Security

MarbleRun — The service mesh for Confidential Computing

Product

Why do we need confidential computing?

Fundamentals

Insights

How do service meshes work?

Fundamentals