PinnedEdgeless SystemsWe’re moving our blog to our website!Service announcement: this blog is now moving to https://www.edgeless.systems/blog/.Sep 4, 20231Sep 4, 20231
PinnedEdgeless SystemsHow to setup Mattermost on the Kubernetes engine ConstellationAnd get memory and storage encryption for freeDec 7, 2022Dec 7, 2022
Edgeless SystemsWhy you should deploy your own confidential GitLabThe challengeDec 20, 2022Dec 20, 2022
Edgeless SystemsConfidential computing will take Blockchain to the next level of securityBlockchain is one of the biggest technology trends in recent years, with exciting potential across a seemingly endless range of use cases…Nov 8, 2022Nov 8, 2022
Edgeless SystemsHow is the performance of Constellation, the always-encrypted Kubernetes, compared to AKS and GKE?As you may know, we’ve recently released Constellation, the first confidential Kubernetes engine, as open source. Constellation keeps all…Oct 21, 2022Oct 21, 2022
Edgeless SystemsHi open-source community, confidential Kubernetes is now on GitHub!Constellation has landed open source on GitHub and you can now have your own confidential Kubernetes. Finally, the public cloud becomes the…Oct 4, 20221Oct 4, 20221
Edgeless SystemsThe differences between Homomorphic Encryption and Confidential Computing and when to use whatSoftware applications typically need to decrypt data to process it. This offers a big attack surface and poses security and privacy risks…Jul 20, 2022Jul 20, 2022
Edgeless SystemsGDPR Compliance in the Public Cloud with Confidential ComputingThe tensions surrounding GDPR, Schrems II and the US CLOUD Act are leading to major risks associated with the cloud transformation. In…Jun 30, 20221Jun 30, 20221
Edgeless SystemsHow to make your existing microservice architecture end-to-end confidentialAugmenting Open Service Mesh on Kubernetes with confidential computingOct 21, 2021Oct 21, 2021
Edgeless SystemsSpotlight: OcclumA look at the open-source confidential computing landscapeSep 8, 20211Sep 8, 20211