Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. ijlal-loutfi

ijlal-loutfi

ijlal-loutfi

23 posts


ijlal-loutfi
7 February 2025

Security in depth with Ubuntu: Mapping security primitives to attacker capabilities

Confidential computing Article

Cybersecurity is not about perfection. In fact, it’s more like a game of chess: predicting your opponent’s moves and making the game unwinnable for them. Like chess players, attackers are always looking for an opening, probing for weaknesses, or waiting for you to make a mistake. Therefore, the best defense isn’t a single unbreakable barr ...


ijlal-loutfi
8 July 2024

Deploy confidential computing with Intel® TDX and Ubuntu 24.04 today

Confidential computing Confidential computing

Discover how to deploy confidential computing with Intel® Trust Domain Extensions (Intel® TDX) on Ubuntu 24.04 LTS. Enhance your data security with simplified VM isolation, protecting sensitive data in system memory effortlessly. ...


ijlal-loutfi
21 February 2024

Preview Confidential AI with Ubuntu Confidential VMs and NVIDIA H100 GPUs on Microsoft Azure

Confidential computing Confidential computing

Learn about Confidential AI preview on Azure with Ubuntu confidental VMs and Nvidia H100 GPUs, and explore how confidential computing in the cloud transforms AI security, ensuring utmost confidentiality and integrity for sensitive data and models. ...


ijlal-loutfi
19 December 2023

Ubuntu Confidential VMs on Azure: Introducing Ephemeral OS disks & vTPMs

Confidential computing Confidential computing

Canonical introduces ephemeral vTPMs for Ubuntu Confidential VMs on Azure, Strengthening remote attestation. Explore the evolution of confidential computing, the pivotal role of vTPMs, and Ubuntu’s solution that minimizes reliance on cloud infrastructure while ensuring comprehensive security within your VM’s software stack.” ...


ijlal-loutfi
12 December 2023

Ubuntu confidential VMs with Intel® TDX are now in public preview on Azure

Confidential computing Confidential computing

Discover the enhanced security of Ubuntu Confidential VMs on Azure. With Intel TDX technology which encrypt your workloads at run time. Explore the public preview today and experience a new level of cloud security ...


ijlal-loutfi
3 November 2023

Intel® TDX 1.0 technology preview available on Ubuntu 23.10

Confidential computing Confidential computing

Today’s security landscape faces a significant challenge: the lack of adequate protection for data in active use. Data breaches can happen at runtime (that is, when computation is taking place on a machine’s main memory), stemming from a range of vectors such as malicious insiders with elevated privileges or hackers exploiting vulnerabili ...


ijlal-loutfi
9 October 2023

Restricted unprivileged user namespaces are coming to Ubuntu 23.10

Security Confidential computing

Ubuntu Desktop firmly places security at the forefront, and adheres to the principles of security by default. This approach caters to both everyday users and organisations with specific compliance requirements. As such, Ubuntu ensures that its recommended security configurations are equally robust, easy to understand and readily accessibl ...


ijlal-loutfi
7 September 2023

TPM-backed Full Disk Encryption is coming to Ubuntu

Confidential computing Confidential computing

Discover Ubuntu’s latest security enhancement: TPM-backed Full Disk Encryption (FDE). This experimental feature in Ubuntu 23.10 offers improved data protection without the need for passphrases ...


ijlal-loutfi
24 July 2023

Why do you also need confidential computing for your private datacenter?

Confidential computing Confidential computing

Confidential computing is not limited to public cloud environments; it also has significant value in private data centers. While private data centers offer data governance, control, and physical security, they are still vulnerable to insider attacks and share the same system software vulnerabilities as public cloud environments. By adopti ...


ijlal-loutfi
11 July 2023

Why you need to protect your confidential virtual machine from itself

Confidential computing Confidential computing

Confidential computing disrupts the traditional threat model by decoupling resource management from data access. It introduces new CPU security extensions like AMD SEV and Intel TDX, providing memory isolation through encryption and hardware access control mechanisms. While confidential computing protects against external threats, it’s im ...


ijlal-loutfi
29 June 2023

The founding moments: Tracing the origins of confidential computing

Confidential computing Confidential computing

In Ernest Hemingway’s novel “The Sun Also Rises,” there is a memorable exchange between the author and the main character, Mike. When asked how he went bankrupt, Mike responds with a concise yet profound answer: “Two ways. Gradually, then suddenly.”  Innovation happens much in the same way. Gradually, then suddenly. Ideas simmer and evolv ...


ijlal-loutfi
28 June 2023

Strengthen your cloud cyber security with Ubuntu Pro and confidential VMs

Ubuntu Confidential computing

Strengthen your cloud cyber security with Ubuntu Pro and confidential VMs. This blog dives into the crucial role your OS plays in cloud security and highlights the extensive security measures offered by Ubuntu, including the game-changing confidential computing technology. ...


  1. Previous page
  2. 1
  3. 2
  4. Next page