Network Security The Role of Hardware TEEs in Confidential Computing Adoption Simon JohnsonOctober 08, 2019Confidential computing essentially uses hardware memory protections to isolate sensitive data payloads.