Close Menu
CloudSecNewsHub
  • News
  • Technologies
  • Automation
  • Updates
  • Guides
  • Tools
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

What's Hot

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025
Facebook X (Twitter) Instagram
Trending
  • Google Cloud Security Plitz attacks e -hunting, improves vision
  • How to pick up criminal evidence for Microsoft 365
  • Cloud security treatment: American federal edition
  • The most prominent report: 2025 Experience of exposure to cloud data
  • Artificial intelligence agents to convert Google Cloud Security Ops
  • The necessity of cloud security in the electronic scene today
  • Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies
  • Ransomware Spike displays cracks in cloud safety
Facebook X (Twitter) Instagram Pinterest Vimeo
CloudSecNewsHubCloudSecNewsHub
  • News

    How to pick up criminal evidence for Microsoft 365

    May 8, 2025

    The most prominent report: 2025 Experience of exposure to cloud data

    May 7, 2025

    Artificial intelligence agents to convert Google Cloud Security Ops

    May 6, 2025

    Ransomware Spike displays cracks in cloud safety

    May 5, 2025

    Sentinelone wins the best safety point and cloud security at the 2025 SC Awards

    May 1, 2025
  • Technologies

    Gartner: How to build a safe institution cloud environment

    April 21, 2025

    Promote South Korea's national security by adopting the cloud

    April 11, 2025

    “The traditional methods of cloud safety, where organizations depend on the segmented cloud safety tools, are not simply enough”

    April 3, 2025

    Stream.security The cloud solution in actual time in industry with TRP technology designed to dilute proactively from the effect of breach in the cloud

    April 1, 2025

    Skyhawk's creation platform mentioned in 2024 Gartner Emerging Tech Impact Radar: Preventive Cyber ​​Security

    March 28, 2025
  • Automation

    Cloud Security Alliance launches an initiative to automate compliance

    April 30, 2025

    The security automation market to see a great expansion

    April 25, 2025

    GSA FedRAMP '20X' rejuvenation keys to automation, to the approvals in “Weeks” – MERITALK

    April 16, 2025

    Cortex Cloud – cloud safety conversion

    April 11, 2025

    TUFIN extends the possibilities of the security of the cloud and the network with the latest version of the synchronous pavilion

    April 8, 2025
  • Updates

    Google Cloud Security Plitz attacks e -hunting, improves vision

    May 8, 2025

    April 2025 Correction Tuesday: updates and analysis

    April 15, 2025

    Google Cloud 2025: News and updates

    April 12, 2025

    5 Google Big Google Aman ads on the next 2025

    April 9, 2025

    Google offers a unified safety platform and safety agents driven by artificial intelligence

    April 9, 2025
  • Guides

    CISO guide for effective cloud security strategies

    April 30, 2025

    Singapore offers instructions to support the cloud and the elasticity of the first place

    April 29, 2025

    Singapore has new guidelines to enhance flexibility and security for cloud services and data centers

    April 5, 2025

    What is the safety of the cloud? | IBM

    April 3, 2025

    Google gets Wiz for $ 32 billion to boost cloud safety

    March 19, 2025
  • Tools

    Cloud security treatment: American federal edition

    May 7, 2025

    The necessity of cloud security in the electronic scene today

    May 6, 2025

    Crowdstrike (CRWD) launches Amnesty International Security tools to improve the cloud p

    April 30, 2025

    The 5 best CNAPP benefits that you need to know in 2025

    April 26, 2025

    The security coalition cloud launches the latest security report. Saas

    April 26, 2025
  • Compliance

    Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies

    May 5, 2025

    Ensuring commitment to international standards

    April 29, 2025

    Thales and Deloitte are an alliance to enhance the security and compliance data strategies

    April 22, 2025

    AWS security compliance is easy: IT-Magic Devops solutions for a stronger security situation

    April 21, 2025

    5 ways that banks can achieve smooth security and compliance in 2025

    April 14, 2025
Login
CloudSecNewsHub
Home»News»Apple's AI moves will impact its future plans for chip and cloud security
News

Apple's AI moves will impact its future plans for chip and cloud security

CloudSecNewsHubBy CloudSecNewsHubSeptember 11, 2019No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Apple's Ai Moves Will Impact Its Future Plans For Chip
Share
Facebook Twitter LinkedIn Pinterest Email

Analysts say the measures Apple has implemented to prevent customer data from being stolen and misused by AI will have a significant impact on device security, especially as AI becomes more prevalent on customer devices.

Apple emphasized customer privacy in the new AI initiatives it announced at its Worldwide Developers Conference a few weeks ago. It has built a vast infrastructure of proprietary hardware and software to support its AI suite.

Apple has complete control over its AI infrastructure, making it difficult for adversaries to break into the systems. Analysts say the company’s black-box approach also provides a blueprint for rival chipmakers and cloud providers to infer AI on devices and servers.

“Apple can leverage the capabilities of a large language model without having any visibility into the data being processed, which is excellent from a customer privacy and corporate accountability standpoint,” says James Sanders, an analyst at TechInsights.

Apple's AI Approach

The AI ​​backend includes new underlying models, servers, and Apple Silicon server chips. AI queries issued by Apple devices are packaged in a secure lockbox, decrypted in Apple’s Private Compute Cloud, and verified as coming from the authorized user and device; the answers are sent to the devices and can only be accessed by authorized users. The data is not visible to Apple or other companies and is deleted once the query is complete.

Apple has built security features directly into its hardware and server chips, enabling users to secure AI queries and protecting them. Data is kept safe while on the device and in transit through features like secure boot, file encryption, user authentication, and secure connections over the Internet via TLS (Transport Layer Security).

Apple is its own customer with its own infrastructure, which is a big advantage, Sanders says, while rival cloud providers and chip makers work with partners that use different technologies for security, hardware and software.

“The ways to do this are different for each cloud,” Sanders says. “There’s no one way to do it, and not having one way to do it adds complexity. And I think the difficulty of doing this at scale becomes even more difficult when you’re dealing with millions of client devices.”

Microsoft's Pluto Approach

But Apple’s main competitor, Microsoft, is already well on its way to providing full privacy for AI with security features built into its chips and its Azure cloud. Last month, the company announced a class of AI computers called CoPilot+ that require a Microsoft security chip called Pluton. The first AI computers shipped this month with chips from Qualcomm, with Pluton turned on by default. Intel and AMD will also ship computers with Pluton chips.

Pluton ensures that data in secure areas is protected and only available to authorized users. The chip is now ready to protect AI customer data, says David Weston, Microsoft’s vice president of enterprise security and operating systems.

“We have a vision for AI mobility between Azure and the customer, and Pluton will be at the heart of that,” he says.

Google declined to comment on its strategy for moving from chip to cloud.

Intel, AMD and Nvidia are also building black boxes into devices that keep AI data safe from hackers. Intel did not respond to requests for comment on its strategy for moving chips to the cloud, but in previous interviews the company has said it prioritizes securing chips for AI.

Security through obfuscation may be effective.

But analysts say the mass marketing approach by chipmakers could leave more room for attackers to intercept data or compromise workflows.

Intel and AMD have a documented history of security vulnerabilities, including Spectre, Meltdown and their derivatives, says Dylan Patel, founder of chip consulting firm SemiAnalysis.

“Anyone can get their hands on Intel chips and try to find attack vectors, but that doesn’t apply to Apple chips and servers,” he says.

By contrast, Apple is a relatively new chip designer and could take a new approach to chip design. Patel says the closed set of chips helps “provide security through obscurity.”

Microsoft has three different confidential computing technologies in preview in the Azure cloud: AMD’s SEP-SNV offering, Intel’s TDX, and Nvidia’s GPU. Nvidia’s GPUs are now a target for hackers with the growing popularity of AI, and the company recently released patches for high-risk vulnerabilities.

Intel and AMD are working with hardware and software partners to deliver their own technologies, creating a longer supply chain to secure them, says Alex Matrosov, CEO of hardware security firm Binarly. That gives hackers more opportunities to poison or steal data used in AI and creates problems in patching vulnerabilities as hardware and software vendors work on their own timelines, he says.

“The technology was not really built from a perspective of seamless integration to focus on actually solving the problem,” Matrosov says. “This introduced many layers of complexity.”

Intel and AMD chips are not inherently designed for confidential computing, and firmware-based rootkits could intercept AI operations.

“The silicon stack has layers of legacy,” Matrosov says. “And then we want discreet computing. It’s not like it’s integrated.”

Apple39s chip cloud Future impact moves plans security
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGoogle Cloud Security updates are intended to protect high-value users
Next Article Check Point Expands Its Leadership in Cloud Security by Delivering Unparalleled Serverless Protection
admin
CloudSecNewsHub
  • Website

Related Posts

Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025
News

How to pick up criminal evidence for Microsoft 365

May 8, 2025
Tools

Cloud security treatment: American federal edition

May 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss
Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

CloudSecNewsHubMay 8, 2025
News

How to pick up criminal evidence for Microsoft 365

CloudSecNewsHubMay 8, 2025
Tools

Cloud security treatment: American federal edition

CloudSecNewsHubMay 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Most Popular

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Don't Miss

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
© 2025 CloudSecNewsHub. All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?