Secret Cove - Anjuna Newsletter - Oct 2024

Published on
Oct 1, 2024
Welcome to the second edition of Secret Cove, Anjuna’s newsletter where we provide a monthly recap of our latest innovations, customer stories, industry trends, and more.
https://www.anjuna.io/blog/secret-cove-anjuna-newsletter-oct-2024

Welcome to the second edition of Secret Cove, Anjuna’s newsletter where we provide a monthly recap of our latest innovations, customer stories, industry trends, and more.

This newsletter is the result of a great body of work by our Marketing team. In simple terms, it represents us reaching a point of maturity such that we can consistently and predictably communicate our point of view about our products, our customers, and the Confidential Computing market. At the same time, it's very much a work in progress. We’re still shaping the tone, personality, and structure of our publication, so we hope that you’ll bear with us as we refine it to make it as engaging and insightful as possible. We hope you’ll let us know if this is working for you or not.

In this edition, we’re excited to share a couple of insightful news pieces about our industry, celebrate a couple of awards that recognize Anjuna’s work culture, and highlight our recent success with the U.S. Navy, who deployed a Llama 3 LLM on NVIDIA H100s in under an hour using the powerful automation of Anjuna Seaglass.

Thank you for being part of this journey. We look forward to sharing more with you in the months ahead!

Best regards,
Mauricio Barra
VP of Marketing, Anjuna

Tide Report

Tide Report keeps you updated with the latest industry news and trends, offering insights into the ever-evolving world of Confidential Computing.

Confidential computing is  emerging as a transformative  trend in cloud computing

Eight emerging trends shaping the future of Cloud Computing

In this recent article, Forbes selected Confidential Computing as one of eight transformative cloud computing trends, offering advanced data protection through hardware-based Trusted Execution Environments (TEEs). The article emphasizes that Confidential Computing ensures secure data processing, even in untrusted environments, making it essential for industries like finance and healthcare that require stringent data privacy measures while leveraging cloud technologies.

How Confidential Computing protects ‘data-in-use’ for AI environments

According to Nelly Porter, Senior Product Manager at Google Cloud, Confidential Computing is essential for securing sensitive AI data-in-use. She emphasizes how it enables secure collaboration, protects privacy, and drives innovation. In her article, Porter outlines key strategies for adopting Confidential Computing to unlock valuable insights and safeguard AI environments.

On the Horizon

On the Horizon keeps you informed about what’s coming next. Explore upcoming events that will keep you up to date on Anjuna and the industry.

10.8 - Technical workshop during SF Tech Week

As part of this year’s SF Tech Week, we’re hosting an immersive 3-hour Confidential Computing workshop—an in-depth, hands-on session featuring multiple exercises in our world-class demo center. This workshop is designed to solidify your knowledge of this cutting-edge technology, while offering the chance to earn CPE credits and the Anjuna Certified Professional certification. Afterward, enjoy lunch on us and take the opportunity to network with fellow participants and Anjuna experts. Don’t miss this chance for a day of learning, connection, and innovation!

Breaking Waves

Breaking Waves brings you the latest news from Anjuna, both about our exciting products as well as the talented people behind our innovations.

Anjuna’s culture continues to earn strong recognition

We’re proud to share that Anjuna has received two major recognitions for our workplace culture: 

  1. We were named to Will Reed’s Top 100 Class of 2024, honoring companies that foster values-driven environments where employees and customers thrive. 
  2. We’re also proud to be recognized by Comparably for having the happiest employees in 2024

These awards are a reflection of our commitment to building a culture of care, innovation, and teamwork, and they are only possible thanks to all the Anjuners that make our company a fantastic place to work. 

Read more in the blog from our Head of People, Natasha Barksdale

Lighthouse Beacon

Tide Report keeps you updated with the latest industry news and trends, offering insights into the ever-evolving world of Confidential Computing.

U.S. Navy charters secure AI course with Confidential Computing

The U.S. Navy, one of the world's most advanced maritime forces, plays a crucial role in maintaining global security. Central to its success is its commitment to innovation, particularly in areas like cybersecurity, AI, and secure communications.

With the support of Anjuna and NVIDIA, U.S. Navy successfully deployed Llama3 LLM models on confidential NVIDIA H100 Tensor Core GPUs within the NVIDIA LaunchPad environment. The deployment demonstrated the combined power of NVIDIA’s cutting-edge GPUs and Anjuna’s flexible Confidential Computing platform.

The Deep Dive

In the Deep Dive, we’ve curated a collection of technical resources to help you explore and expand your understanding of Confidential Computing.

Under the Hood with AWS

Sr. Product Manager, Bobbie Chen, recently joined AWS' Art Baudo and Arvind Raghu for an exciting episode of Under the Hood with AWS. They dove deep into Confidential Computing with AWS Nitro Enclaves and shared some real-world use cases from Anjuna. The discussion was packed with insights and featured multiple demos, giving listeners a hands-on look at the technology in action.

Breach Prevention - Exploration of the 2017 Equifax Breach

In our latest white paper, we analyze the 2017 Equifax breach, which exposed the personal data of 147 million people, and demonstrate how Confidential Computing could have significantly reduced the damage. Through data-in-use isolation, attestation, and other advanced platform capabilities, Anjuna Seaglass would have prevented key attack vectors such as credential access, lateral movement, and data exfiltration, even after the attacker gained initial access.

More like this
Get Started Free with Anjuna Seaglass

Try free for 30 days on AWS, Azure or Google Cloud, and experience the power of intrinsic cloud security.

Start Free