HUB Security SPAC Presentation Deck slide image

HUB Security SPAC Presentation Deck

What is Confidential Computing? 9 Confidential computing leverages a hardware-based trusted execution environment to protect data being processed. Protection at Rest Securing data being stored by encrypting it before storing it or encrypting the device itself Protection in Transit Securing data transmitted between networks using end-to-end encryption or by using encrypted connections Prevalent data security model Current security models adequately mitigate risks involved with storage and transmission of data but fail to address risks of exposing data while being processed 19⁹10 Holistic data security model Emerging security models encourage the adoption of a comprehensive protection model that mitigates risks across the data lifecycle from transmission to storage and usage, which can be achieved through confidential computing I HUB Protection in Use Protecting data by encrypting it while it is being used in the RAM or processor for computation H HUB SECURI Page 8
View entire presentation