Skip to main content
  1. Blog
  2. ijlal-loutfi

ijlal-loutfi

ijlal-loutfi

26 posts


ijlal-loutfi
6 March 2026

Sovereign clouds: enhanced data security with confidential computing 

Confidential computing Article

Increasingly, enterprises are interested in improving their level of control over their data, achieving digital sovereignty, and even building their own sovereign cloud. However, this means moving beyond thinking about just where your data is stored to thinking about the entire data lifecycle.  In this blog, we cover the differences betwe ...


ijlal-loutfi
21 October 2025

What’s new in security for Ubuntu 25.10? 

Ubuntu Article

Ubuntu 25.10 Questing Quokka has landed, marking the final interim release before Ubuntu 26.04 LTS,  and it’s a bold one. Interim releases have always been the proving grounds for features that define the next LTS, and this cycle is no exception. From memory-safe reimplementations of foundational tools to hardware-backed encryption, post- ...


ijlal-loutfi
19 August 2025

AMD SEV-SNP host support available on Ubuntu 25.04

Confidential computing Article

Ubuntu 25.04 introduces full AMD SEV-SNP host support, making Ubuntu the first production-grade Linux distribution to deliver end-to-end confidential computing , from host to guest , without out-of-tree patches or experimental builds. With this release, enterprises can deploy confidential virtual machines on fully Ubuntu-based stacks in b ...


ijlal-loutfi
6 August 2025

Is Linux secure?

Confidential computing Article

Does operating system (OS) security matter? Meet Pal. Pal is a senior developer working at PalBank. For the next 6 months, Pal will be responsible for leading the development of the bank’s web application client, which will be used daily by millions of customers. Pal invests considerable effort into designing and implementing the most sec ...


ijlal-loutfi
7 February 2025

Security in depth with Ubuntu: Mapping security primitives to attacker capabilities

Confidential computing Article

Cybersecurity is not about perfection. In fact, it’s more like a game of chess: predicting your opponent’s moves and making the game unwinnable for them. Like chess players, attackers are always looking for an opening, probing for weaknesses, or waiting for you to make a mistake. Therefore, the best defense isn’t a single unbreakable barr ...


ijlal-loutfi
8 July 2024

Deploy confidential computing with Intel® TDX and Ubuntu 24.04 today

Confidential computing Confidential computing

Discover how to deploy confidential computing with Intel® Trust Domain Extensions (Intel® TDX) on Ubuntu 24.04 LTS. Enhance your data security with simplified VM isolation, protecting sensitive data in system memory effortlessly. ...


ijlal-loutfi
21 February 2024

Preview Confidential AI with Ubuntu Confidential VMs and NVIDIA H100 GPUs on Microsoft Azure

Confidential computing Confidential computing

Learn about Confidential AI preview on Azure with Ubuntu confidental VMs and Nvidia H100 GPUs, and explore how confidential computing in the cloud transforms AI security, ensuring utmost confidentiality and integrity for sensitive data and models. ...


ijlal-loutfi
19 December 2023

Ubuntu Confidential VMs on Azure: Introducing Ephemeral OS disks & vTPMs

Confidential computing Confidential computing

Canonical introduces ephemeral vTPMs for Ubuntu Confidential VMs on Azure, Strengthening remote attestation. Explore the evolution of confidential computing, the pivotal role of vTPMs, and Ubuntu’s solution that minimizes reliance on cloud infrastructure while ensuring comprehensive security within your VM’s software stack.” ...


ijlal-loutfi
12 December 2023

Ubuntu confidential VMs with Intel® TDX are now in public preview on Azure

Confidential computing Confidential computing

Discover the enhanced security of Ubuntu Confidential VMs on Azure. With Intel TDX technology which encrypt your workloads at run time. Explore the public preview today and experience a new level of cloud security ...


ijlal-loutfi
3 November 2023

Intel® TDX 1.0 technology preview available on Ubuntu 23.10

Confidential computing Confidential computing

Today’s security landscape faces a significant challenge: the lack of adequate protection for data in active use. Data breaches can happen at runtime (that is, when computation is taking place on a machine’s main memory), stemming from a range of vectors such as malicious insiders with elevated privileges or hackers exploiting vulnerabili ...


ijlal-loutfi
9 October 2023

Restricted unprivileged user namespaces are coming to Ubuntu 23.10

Security Confidential computing

Ubuntu Desktop firmly places security at the forefront, and adheres to the principles of security by default. This approach caters to both everyday users and organisations with specific compliance requirements. As such, Ubuntu ensures that its recommended security configurations are equally robust, easy to understand and readily accessibl ...


  1. Previous page
  2. 1
  3. 2
  4. 3
  5. Next page