The Next Episode in Workload Isolation: Confidential Containers - Jeremi Piotrowski, Microsoft
Confidential Containers as a Gateway to Cloud Adoption in Sensitive Sectors
Confidential Containers: Why, How, and Where Are We? - Magnus Kulke, Microsoft
Confidential Containers by Enclaive and what they can mean to you!
Increasing Trust in Confidential Computing with Project Amber | Intel Technology
Cloud native Confidential: Isolating Kubernetes Pods with Confidential Computing
Lightning Talk: Kata Confidential Containers Meet Persistent Stora... Andy Zhang & Archana Choudhary
Hands-on Workshop: Confidential Containers: Bringing Confid... Mikko Ylinen & Tobin Feldman-Fitzthum
Confidential containers on Azure Container Instances (ACI)
Confidential Containers Made Easy - Fabiano Fidencio, Intel & Jens Freimann, Red Hat
Increasing Trust in Confidential Computing with Project Amber | Intel Business
Practical Guide to Container Isolation
Confidential Containers for GPU Compute: Incorporating LLMs in a Lift-and-Shift Strategy for AI
Getting Started with Google Confidential VMs
Confidential Containers for vSphere Pods on AMD
Confidential Computing Trust Boundaries - Intel SGX and TDX | Intel Technology
Your Containers Aren’t Alone: Demystifying Container Isolation - Marina Moore, Edera
New confidential container offerings in Microsoft Azure
Device Attestation in Hardware TEE based Confidential Computing - Jiewen Yao & Jun Nakajima, Intel
Red Hat OpenShift confidential containers environment on Azure