• About Us
  • Disclaimer
  • Contact Us
  • Privacy Policy
Wednesday, March 11, 2026
mGrowTech
No Result
View All Result
  • Technology And Software
    • Account Based Marketing
    • Channel Marketing
    • Marketing Automation
      • Al, Analytics and Automation
      • Ad Management
  • Digital Marketing
    • Social Media Management
    • Google Marketing
  • Direct Marketing
    • Brand Management
    • Marketing Attribution and Consulting
  • Mobile Marketing
  • Event Management
  • PR Solutions
  • Technology And Software
    • Account Based Marketing
    • Channel Marketing
    • Marketing Automation
      • Al, Analytics and Automation
      • Ad Management
  • Digital Marketing
    • Social Media Management
    • Google Marketing
  • Direct Marketing
    • Brand Management
    • Marketing Attribution and Consulting
  • Mobile Marketing
  • Event Management
  • PR Solutions
No Result
View All Result
mGrowTech
No Result
View All Result
Home Technology And Software

Nvidia Rubin's rack-scale encryption signals a turning point for enterprise AI security

Josh by Josh
January 13, 2026
in Technology And Software
0
Nvidia Rubin's rack-scale encryption signals a turning point for enterprise AI security



Nvidia's Vera Rubin NVL72, announced at CES 2026, encrypts every bus across 72 GPUs, 36 CPUs, and the entire NVLink fabric. It's the first rack-scale platform to deliver confidential computing across CPU, GPU, and NVLink domains.

READ ALSO

Looking Glass’ Musubi showcases its holographic display in a consumer-friendly package

A Certified Sleep Coach Shares the Sleep Week Deals She’s Adding to Cart (2026)

For security leaders, this fundamentally shifts the conversation. Rather than attempting to secure complex hybrid cloud configurations through contractual trust with cloud providers, they can verify them cryptographically. That’s a critical distinction that matters when nation-state adversaries have proven they are capable of launching targeted cyberattacks at machine speed.

The brutal economics of unprotected AI

Epoch AI research shows frontier training costs have grown at 2.4x annually since 2016, which means billion-dollar training runs could be a reality within a few short years. Yet the infrastructure protecting these investments remains fundamentally insecure in most deployments. Security budgets created to protect frontier training models aren't keeping up with the exceptionally fast pace of model training. The result is that more models are under threat as existing approaches can't scale and keep up with adversaries' tradecraft.

IBM's 2025 Cost of Data Breach Report found that 13% of organizations experienced breaches of AI models or applications. Among those breached, 97% lacked proper AI access controls.

Shadow AI incidents cost $4.63 million on average, or $670,000 more than standard breaches, with one in five breaches now involving unsanctioned tools that disproportionately expose customer PII (65%) and intellectual property (40%).

Think about what this means for organizations spending $50 million or $500 million on a training run. Their model weights sit in multi-tenant environments where cloud providers can inspect the data. Hardware-level encryption that proves the environment hasn't been tampered with changes that financial equation entirely.

The GTG-1002 wake-up call

In November 2025, Anthropic disclosed something unprecedented: A Chinese state-sponsored group designated GTG-1002 had manipulated Claude Code to conduct what the company described as the first documented case of a large-scale cyberattack executed without substantial human intervention.

State-sponsored adversaries turned it into an autonomous intrusion agent that discovered vulnerabilities, crafted exploits, harvested credentials, moved laterally through networks, and categorized stolen data by intelligence value. Human operators stepped in only at critical junctures. According to Anthropic's analysis, the AI executed around 80 to 90% of all tactical work independently.

The implications extend beyond this single incident. Attack surfaces that once required teams of experienced attackers can now be probed at machine speed by opponents with access to foundation models.

Comparing the performance of Blackwell vs. Rubin

Specification

Blackwell GB300 NVL72

Rubin NVL72

Inference compute (FP4)

1.44 exaFLOPS

3.6 exaFLOPS

NVFP4 per GPU (inference)

20 PFLOPS

50 PFLOPS

Per-GPU NVLink bandwidth

1.8 TB/s

3.6 TB/s

Rack NVLink bandwidth

130 TB/s

260 TB/s

HBM bandwidth per GPU

~8 TB/s

~22 TB/s

Industry momentum and AMD's alternative

Nvidia isn't operating in isolation. Research from the Confidential Computing Consortium and IDC, released in December, found that 75% of organizations are adopting confidential computing, with 18% already in production and 57% piloting deployments.

"Confidential Computing has grown from a niche concept into a vital strategy for data security and trusted AI innovation," said Nelly Porter, governing board chair of the Confidential Computing Consortium. Real barriers remain: attestation validation challenges affect 84% of respondents, and a skills gap hampers 75%.

AMD's Helios rack takes a different approach. Built on Meta's Open Rack Wide specification, announced at OCP Global Summit in October 2025, it delivers approximately 2.9 exaflops of FP4 compute with 31 TB of HBM4 memory and 1.4 PB/s aggregate bandwidth. Where Nvidia designs confidential computing into every component, AMD prioritizes open standards through the Ultra Accelerator Link and Ultra Ethernet consortia.

The competition between Nvidia and AMD is giving security leaders more of a choice than they otherwise would have had. Comparing the tradeoffs of Nvidia's integrated approach versus AMD's open-standards flexibility for their specific infrastructures and business-specific threat models is key.

What security leaders are doing now

Hardware-level confidentiality doesn't replace zero-trust principles; it gives them teeth. What Nvidia and AMD are building lets security leaders verify trust cryptographically rather than assume it contractually.

That's a meaningful shift for anyone running sensitive workloads on shared infrastructure. And if the attestation claims hold up in production, this approach could let enterprises extend zero-trust enforcement across thousands of nodes without the policy sprawl and agent overhead that software-only implementations require.

Before deployment: Verify attestation to confirm environments haven't been tampered with. Cryptographic proof of compliance should be a prerequisite for signing contracts, not an afterthought or worse, a nice-to-have. If your cloud provider can't demonstrate attestation capabilities, that's a question worth raising in your next QBR.

During operation: Maintain separate enclaves for training and inference, and include security teams in the model pipeline from the very start. IBM's research showed 63% of breached organizations had no AI governance policy. You can't bolt security on after development; that translates into an onramp for mediocre security design-ins and lengthy red teaming that catches bugs that needed to be engineered out of a model or app early.

Across the organization: Run joint exercises between security and data science teams to surface vulnerabilities before attackers find them. Shadow AI accounted for 20% of breaches and exposed customer PII and IP at higher rates than other breach types.

Bottom line

The GTG-1002 campaign demonstrated that adversaries can now automate large-scale intrusions with minimal human oversight at scale. Nearly every organization that experienced an AI-related breach lacked proper access controls.

Nvidia's Vera Rubin NVL72 transforms racks from potential liabilities into cryptographically attested assets by encrypting every bus. AMD's Helios offers an open-standards alternative. Hardware confidentiality alone won't stop a determined adversary, but combined with strong governance and realistic threat exercises, rack-scale encryption gives security leaders the foundation they need to protect investments measured in hundreds of millions of dollars.

The question facing CISOs isn't whether attested infrastructure is worth it. It's whether organizations building high-value AI models can afford to operate without it.



Source_link

Related Posts

Looking Glass’ Musubi showcases its holographic display in a consumer-friendly package
Technology And Software

Looking Glass’ Musubi showcases its holographic display in a consumer-friendly package

March 11, 2026
A Certified Sleep Coach Shares the Sleep Week Deals She’s Adding to Cart (2026)
Technology And Software

A Certified Sleep Coach Shares the Sleep Week Deals She’s Adding to Cart (2026)

March 11, 2026
Google brings Gemini in Chrome to India
Technology And Software

Google brings Gemini in Chrome to India

March 11, 2026
Anthropic and OpenAI just exposed SAST's structural blind spot with free tools
Technology And Software

Anthropic and OpenAI just exposed SAST's structural blind spot with free tools

March 10, 2026
ChatGPT will now generate interactive visuals to help you with math and science concepts
Technology And Software

ChatGPT will now generate interactive visuals to help you with math and science concepts

March 10, 2026
I Used Google’s New Gemini-Powered ‘Help Me Create’ Tool in Docs. It’s Great at Corporate-Speak
Technology And Software

I Used Google’s New Gemini-Powered ‘Help Me Create’ Tool in Docs. It’s Great at Corporate-Speak

March 10, 2026
Next Post
60+ social media statistics marketers need to know in 2026

60+ social media statistics marketers need to know in 2026

POPULAR NEWS

Trump ends trade talks with Canada over a digital services tax

Trump ends trade talks with Canada over a digital services tax

June 28, 2025
Communication Effectiveness Skills For Business Leaders

Communication Effectiveness Skills For Business Leaders

June 10, 2025
15 Trending Songs on TikTok in 2025 (+ How to Use Them)

15 Trending Songs on TikTok in 2025 (+ How to Use Them)

June 18, 2025
App Development Cost in Singapore: Pricing Breakdown & Insights

App Development Cost in Singapore: Pricing Breakdown & Insights

June 22, 2025
Google announced the next step in its nuclear energy plans 

Google announced the next step in its nuclear energy plans 

August 20, 2025

EDITOR'S PICK

Google Is Stealing Your International Search Traffic With Automated Translations

Google Is Stealing Your International Search Traffic With Automated Translations

June 5, 2025
How to Use the Unknown Key in The Forge

How to Use the Unknown Key in The Forge

December 3, 2025

First-ever auction of AI-created artwork set for Christie’s gavel

March 22, 2025
New York governor clears path for robotaxis everywhere, with one notable exception

New York governor clears path for robotaxis everywhere, with one notable exception

January 14, 2026

About

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Follow us

Categories

  • Account Based Marketing
  • Ad Management
  • Al, Analytics and Automation
  • Brand Management
  • Channel Marketing
  • Digital Marketing
  • Direct Marketing
  • Event Management
  • Google Marketing
  • Marketing Attribution and Consulting
  • Marketing Automation
  • Mobile Marketing
  • PR Solutions
  • Social Media Management
  • Technology And Software
  • Uncategorized

Recent Posts

  • Real-Time Reputation Management for Travel Brands
  • Looking Glass’ Musubi showcases its holographic display in a consumer-friendly package
  • A better method for planning complex visual tasks | MIT News
  • When Clickbait Becomes a Lesson
  • About Us
  • Disclaimer
  • Contact Us
  • Privacy Policy
No Result
View All Result
  • Technology And Software
    • Account Based Marketing
    • Channel Marketing
    • Marketing Automation
      • Al, Analytics and Automation
      • Ad Management
  • Digital Marketing
    • Social Media Management
    • Google Marketing
  • Direct Marketing
    • Brand Management
    • Marketing Attribution and Consulting
  • Mobile Marketing
  • Event Management
  • PR Solutions