July 4, 2023, 1:24 a.m. | Agam Shah, Contributing Writer

Dark Reading www.darkreading.com

The company's Confidential Data Search technique relies on confidential computing to keep data secure even while it is in use.

computing confidential confidential computing data fortanix hardware hardware security plaintext search security the company

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior Security Researcher, SIEM

@ Huntress | Remote Canada

Senior Application Security Engineer

@ Revinate | San Francisco Bay Area

Cyber Security Manager

@ American Express Global Business Travel | United States - New York - Virtual Location

Incident Responder Intern

@ Bentley Systems | Remote, PA, US

SC2024-003533 Senior Online Vulnerability Assessment Analyst (CTS) - THU 9 May

@ EMW, Inc. | Mons, Wallonia, Belgium