Google, the tech giant known for its extensive digital presence, is integrating cutting-edge confidential computing technology to strengthen the data security measures employed in its digital advertising campaigns. This advanced technology leverages specialized software and hardware known as Trusted Execution Environments (TEEs) to protect sensitive business data from unauthorized access.
Alphabet Inc’s subsidiary has announced that these TEEs will be isolated even from Google’s own engineers, providing a high level of security and trust for users involved in various business ad campaigns. Previously, protection was offered through Customer Matching data safeguards.
This implementation of confidential computing technology marks a groundbreaking move, potentially setting a global precedent. It promises enhanced privacy while allowing businesses to analyze and quantify audience profiles with greater efficiency.
Despite the advancements, some tech experts have expressed concerns. They argue that integrating this technology into cloud data processing—both at rest and in transit—could have further elevated the security and utility of data storage solutions.
Confidential computing technology, akin to what is used in the financial industry for securing sensitive information like credit card details and passwords, is now being applied in a novel way within the realm of digital advertising.
In parallel, the Irish Data Protection Commission has initiated an investigation into how Google utilizes data to train its AI models, including the Pathways Language Model 2 (PaLM2). The European Union regulators based in Dublin will also review Google’s compliance with the General Data Protection Regulation (GDPR), focusing on whether user data is processed with or without consent.
For those following the latest developments, PaLM2 harnesses vast amounts of data to create AI capabilities and has recently begun employing this technology to provide email summary features for Gmail users.
The post Google Enhances Data Security with Confidential Computing Technology appeared first on Cybersecurity Insiders.
September 16, 2024 at 08:44PM
0 comments:
Post a Comment