Continuum AI is now publicly available. Try out the first confidential LLM platform!

Blog | Insights

AI icon on black background with green dots

Apple Private Cloud Compute: core concepts and an open alternative

Security

Insights

Ai prompts icon

AI security: Here's why you should keep your prompts and responses encrypted and how to go about it

Security

Insights

Collaboration icon on purple gradient background

Confidential computing and multi-party computation (MPC)

Insights

Security

Ransomware attack icon

How does confidential computing help against ransomware attacks?

Security

Insights

Blog OC3

OC3 2024 and the growth of confidential computing

Company

Insights

Secure 5G networks with confidential computing

Insights

Security

How confidential computing and AI fit together

Insights

The relationship between zero trust and confidential computing

Insights

Fundamentals

Security

The three levels of confidential computing

Insights

Fundamentals

Security

open source blog

Why and how companies do open source

Insights

confidential computing & blockchain

Confidential computing will take blockchain to the next level of security

Insights

Bring your own key (BYOK) was a lie!

Bring your own key (BYOK) was a lie!

Security

Insights

Confidential SaaS: A new security paradigm for software-as-a-service

Confidential SaaS: A new security paradigm for software-as-a-service

Insights

homomorphic encryption vs confidential computing blog.webp

The differences between Homomorphic Encryption (HE) and Confidential Computing (CC)

Insights

GDPR compliance in the public cloud with confidential computing

GDPR compliance in the public cloud with confidential computing

Insights

Spotlight: Occlum

Spotlight: Occlum

Insights

Arm Veracruz

Spotlight: Arm Veracruz

Insights

TensorFlow / MarbleRun

Confidential multi-stakeholder AI

Insights

MarbleRun now supports Occlum — even more confidential computing at scale

Company

Insights

How we are losing control of our data… and how we will get it back!

Insights

Why do we need confidential computing?

Fundamentals

Insights