• About Us
  • Disclaimer
  • Contact Us
  • Privacy Policy
Friday, January 23, 2026
mGrowTech
No Result
View All Result
  • Technology And Software
    • Account Based Marketing
    • Channel Marketing
    • Marketing Automation
      • Al, Analytics and Automation
      • Ad Management
  • Digital Marketing
    • Social Media Management
    • Google Marketing
  • Direct Marketing
    • Brand Management
    • Marketing Attribution and Consulting
  • Mobile Marketing
  • Event Management
  • PR Solutions
  • Technology And Software
    • Account Based Marketing
    • Channel Marketing
    • Marketing Automation
      • Al, Analytics and Automation
      • Ad Management
  • Digital Marketing
    • Social Media Management
    • Google Marketing
  • Direct Marketing
    • Brand Management
    • Marketing Attribution and Consulting
  • Mobile Marketing
  • Event Management
  • PR Solutions
No Result
View All Result
mGrowTech
No Result
View All Result
Home Technology And Software

Nvidia Rubin's rack-scale encryption signals a turning point for enterprise AI security

Josh by Josh
January 13, 2026
in Technology And Software
0
Nvidia Rubin's rack-scale encryption signals a turning point for enterprise AI security
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter



Nvidia's Vera Rubin NVL72, announced at CES 2026, encrypts every bus across 72 GPUs, 36 CPUs, and the entire NVLink fabric. It's the first rack-scale platform to deliver confidential computing across CPU, GPU, and NVLink domains.

READ ALSO

Sennheiser introduces new TV headphones bundle with Auracast

Legislators Push to Make Companies Tell Customers When Their Products Will Die

For security leaders, this fundamentally shifts the conversation. Rather than attempting to secure complex hybrid cloud configurations through contractual trust with cloud providers, they can verify them cryptographically. That’s a critical distinction that matters when nation-state adversaries have proven they are capable of launching targeted cyberattacks at machine speed.

The brutal economics of unprotected AI

Epoch AI research shows frontier training costs have grown at 2.4x annually since 2016, which means billion-dollar training runs could be a reality within a few short years. Yet the infrastructure protecting these investments remains fundamentally insecure in most deployments. Security budgets created to protect frontier training models aren't keeping up with the exceptionally fast pace of model training. The result is that more models are under threat as existing approaches can't scale and keep up with adversaries' tradecraft.

IBM's 2025 Cost of Data Breach Report found that 13% of organizations experienced breaches of AI models or applications. Among those breached, 97% lacked proper AI access controls.

Shadow AI incidents cost $4.63 million on average, or $670,000 more than standard breaches, with one in five breaches now involving unsanctioned tools that disproportionately expose customer PII (65%) and intellectual property (40%).

Think about what this means for organizations spending $50 million or $500 million on a training run. Their model weights sit in multi-tenant environments where cloud providers can inspect the data. Hardware-level encryption that proves the environment hasn't been tampered with changes that financial equation entirely.

The GTG-1002 wake-up call

In November 2025, Anthropic disclosed something unprecedented: A Chinese state-sponsored group designated GTG-1002 had manipulated Claude Code to conduct what the company described as the first documented case of a large-scale cyberattack executed without substantial human intervention.

State-sponsored adversaries turned it into an autonomous intrusion agent that discovered vulnerabilities, crafted exploits, harvested credentials, moved laterally through networks, and categorized stolen data by intelligence value. Human operators stepped in only at critical junctures. According to Anthropic's analysis, the AI executed around 80 to 90% of all tactical work independently.

The implications extend beyond this single incident. Attack surfaces that once required teams of experienced attackers can now be probed at machine speed by opponents with access to foundation models.

Comparing the performance of Blackwell vs. Rubin

Specification

Blackwell GB300 NVL72

Rubin NVL72

Inference compute (FP4)

1.44 exaFLOPS

3.6 exaFLOPS

NVFP4 per GPU (inference)

20 PFLOPS

50 PFLOPS

Per-GPU NVLink bandwidth

1.8 TB/s

3.6 TB/s

Rack NVLink bandwidth

130 TB/s

260 TB/s

HBM bandwidth per GPU

~8 TB/s

~22 TB/s

Industry momentum and AMD's alternative

Nvidia isn't operating in isolation. Research from the Confidential Computing Consortium and IDC, released in December, found that 75% of organizations are adopting confidential computing, with 18% already in production and 57% piloting deployments.

"Confidential Computing has grown from a niche concept into a vital strategy for data security and trusted AI innovation," said Nelly Porter, governing board chair of the Confidential Computing Consortium. Real barriers remain: attestation validation challenges affect 84% of respondents, and a skills gap hampers 75%.

AMD's Helios rack takes a different approach. Built on Meta's Open Rack Wide specification, announced at OCP Global Summit in October 2025, it delivers approximately 2.9 exaflops of FP4 compute with 31 TB of HBM4 memory and 1.4 PB/s aggregate bandwidth. Where Nvidia designs confidential computing into every component, AMD prioritizes open standards through the Ultra Accelerator Link and Ultra Ethernet consortia.

The competition between Nvidia and AMD is giving security leaders more of a choice than they otherwise would have had. Comparing the tradeoffs of Nvidia's integrated approach versus AMD's open-standards flexibility for their specific infrastructures and business-specific threat models is key.

What security leaders are doing now

Hardware-level confidentiality doesn't replace zero-trust principles; it gives them teeth. What Nvidia and AMD are building lets security leaders verify trust cryptographically rather than assume it contractually.

That's a meaningful shift for anyone running sensitive workloads on shared infrastructure. And if the attestation claims hold up in production, this approach could let enterprises extend zero-trust enforcement across thousands of nodes without the policy sprawl and agent overhead that software-only implementations require.

Before deployment: Verify attestation to confirm environments haven't been tampered with. Cryptographic proof of compliance should be a prerequisite for signing contracts, not an afterthought or worse, a nice-to-have. If your cloud provider can't demonstrate attestation capabilities, that's a question worth raising in your next QBR.

During operation: Maintain separate enclaves for training and inference, and include security teams in the model pipeline from the very start. IBM's research showed 63% of breached organizations had no AI governance policy. You can't bolt security on after development; that translates into an onramp for mediocre security design-ins and lengthy red teaming that catches bugs that needed to be engineered out of a model or app early.

Across the organization: Run joint exercises between security and data science teams to surface vulnerabilities before attackers find them. Shadow AI accounted for 20% of breaches and exposed customer PII and IP at higher rates than other breach types.

Bottom line

The GTG-1002 campaign demonstrated that adversaries can now automate large-scale intrusions with minimal human oversight at scale. Nearly every organization that experienced an AI-related breach lacked proper access controls.

Nvidia's Vera Rubin NVL72 transforms racks from potential liabilities into cryptographically attested assets by encrypting every bus. AMD's Helios offers an open-standards alternative. Hardware confidentiality alone won't stop a determined adversary, but combined with strong governance and realistic threat exercises, rack-scale encryption gives security leaders the foundation they need to protect investments measured in hundreds of millions of dollars.

The question facing CISOs isn't whether attested infrastructure is worth it. It's whether organizations building high-value AI models can afford to operate without it.



Source_link

Related Posts

Sennheiser introduces new TV headphones bundle with Auracast
Technology And Software

Sennheiser introduces new TV headphones bundle with Auracast

January 23, 2026
Legislators Push to Make Companies Tell Customers When Their Products Will Die
Technology And Software

Legislators Push to Make Companies Tell Customers When Their Products Will Die

January 22, 2026
Humans& thinks coordination is the next frontier for AI, and they’re building a model to prove it
Technology And Software

Humans& thinks coordination is the next frontier for AI, and they’re building a model to prove it

January 22, 2026
8 Best Gig Economy Jobs To Consider For Passive Income
Technology And Software

8 Best Gig Economy Jobs To Consider For Passive Income

January 22, 2026
Why LinkedIn says prompting was a non-starter — and small models was the breakthrough
Technology And Software

Why LinkedIn says prompting was a non-starter — and small models was the breakthrough

January 22, 2026
X is also launching Bluesky-like starter packs
Technology And Software

X is also launching Bluesky-like starter packs

January 22, 2026
Next Post
60+ social media statistics marketers need to know in 2026

60+ social media statistics marketers need to know in 2026

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

POPULAR NEWS

Trump ends trade talks with Canada over a digital services tax

Trump ends trade talks with Canada over a digital services tax

June 28, 2025
Communication Effectiveness Skills For Business Leaders

Communication Effectiveness Skills For Business Leaders

June 10, 2025
15 Trending Songs on TikTok in 2025 (+ How to Use Them)

15 Trending Songs on TikTok in 2025 (+ How to Use Them)

June 18, 2025
App Development Cost in Singapore: Pricing Breakdown & Insights

App Development Cost in Singapore: Pricing Breakdown & Insights

June 22, 2025
Google announced the next step in its nuclear energy plansĀ 

Google announced the next step in its nuclear energy plansĀ 

August 20, 2025

EDITOR'S PICK

How AI Will Change Website Development by 2026

How AI Will Change Website Development by 2026

December 13, 2025
5-Step Guide to Search Engine & AI Visibility

5-Step Guide to Search Engine & AI Visibility

October 13, 2025
SwiReasoning: Entropy-Driven Alternation of Latent and Explicit Chain-of-Thought for Reasoning LLMs

SwiReasoning: Entropy-Driven Alternation of Latent and Explicit Chain-of-Thought for Reasoning LLMs

October 13, 2025

3 immediate considerations when writing a crisis response

September 29, 2025

About

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Follow us

Categories

  • Account Based Marketing
  • Ad Management
  • Al, Analytics and Automation
  • Brand Management
  • Channel Marketing
  • Digital Marketing
  • Direct Marketing
  • Event Management
  • Google Marketing
  • Marketing Attribution and Consulting
  • Marketing Automation
  • Mobile Marketing
  • PR Solutions
  • Social Media Management
  • Technology And Software
  • Uncategorized

Recent Posts

  • How I Got AI to Quote Us with 4 Simple Strategies
  • List of Spin a Baddie Codes
  • Sennheiser introduces new TV headphones bundle with Auracast
  • Microsoft Releases VibeVoice-ASR: A Unified Speech-to-Text Model Designed to Handle 60-Minute Long-Form Audio in a Single Pass
  • About Us
  • Disclaimer
  • Contact Us
  • Privacy Policy
No Result
View All Result
  • Technology And Software
    • Account Based Marketing
    • Channel Marketing
    • Marketing Automation
      • Al, Analytics and Automation
      • Ad Management
  • Digital Marketing
    • Social Media Management
    • Google Marketing
  • Direct Marketing
    • Brand Management
    • Marketing Attribution and Consulting
  • Mobile Marketing
  • Event Management
  • PR Solutions

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?