Page 102 - Cyber Defense eMagazine September 2022
P. 102
Potential solutions to these issues
One possible solution for companies who wish to enhance the security of their complex enterprise
structure could be to adopt confidential computing.
This privacy preserving technology encrypts data while it is still in its processing stage, enabling firms to
securely aggregate their datasets to solve shared business problems without revealing the raw enterprise
data to anyone.
Additionally, it secures the processed and consolidated data from multiple databases as well as the
insights generated from them, disallowing access from any party and minimizing the risk of data
manipulation.
This new form of data processing can protect policymakers and relevant stakeholders from data
breaches, since raw data is not being distributed or made available to external parties. In fact, many
enterprises are starting to realise the benefits of adopting confidential computing in today’s distributed
work environment.
A report published by Everest Group, for example, forecasts that the confidential computing market could
grow from US1.9 billion in 2021 to US$54 billion by 2026.
Alongside confidential computing, a “zero trust” approach could also be used to compliment the protection
it provides and strengthen its impact. A ‘Zero trust’ security model requires that a transaction be verified
for it to be successful to prevent any security breaches. This implies that all transactions made – even if
from within the network - must be verified. Between 2020 and 2026, the market is expected to grow from
US$19.6 billion to US $51.6 billion.
However, one challenge of the ‘zero trust’ architecture includes the strict requirements of a ‘zero trust’
network and its implementation. Some of these requirements include ensuring network security,
infrastructure security and identity security. But we can expect this to be made easier thanks to emerging
technologies that are keeping up with the demand for enhanced security.
Looking ahead
With the rise of remote work and a hybrid cloud environment, traditional networks are increasingly unable
to keep up with the ever-growing security needs of firms.
If firms wish to effectively adapt to this “new normal” of hybrid working and promote growth in a post
pandemic world, confidence in data sharing must improve. To effectively accomplish this, privacy-
enhancing technology like confidential computing should be the answer.
Cyber Defense eMagazine – September 2022 Edition 102
Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.