security and defense

Guide

Confidential computing & AI for security and defense

In this guide, you will learn:

  • Why cloud and AI services pose unique risks in defense environments – shared infrastructure, administrator access, and co-tenant attacks.
  • How confidential computing addresses these risks – runtime encryption and cryptographic remote attestation ensure verifiable confidentiality and integrity.
  • The threats mitigated – from compromised infrastructure and insider attacks to malicious updates or physical hardware loss.
  • A concrete case study: the Airbus Combat Cloud project.

Download the "Confidential computing for security and defense" 2-pager!

The form failed to load. Please send an email to contact@edgeless.systems. Loading likely fails because you are using privacy settings or ad blocks.