Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

An error occurred while submitting your form. Please try again or file a bug report. Close

  1. Blog
  2. ijlal-loutfi

ijlal-loutfi

ijlal-loutfi

4 posts


ijlal-loutfi
21 October 2025

What’s new in security for Ubuntu 25.10? 

Ubuntu Article

Ubuntu 25.10 Questing Quokka has landed, marking the final interim release before Ubuntu 26.04 LTS,  and it’s a bold one. Interim releases have always been the proving grounds for features that define the next LTS, and this cycle is no exception. From memory-safe reimplementations of foundational tools to hardware-backed encryption, post- ...


ijlal-loutfi
19 August 2025

AMD SEV-SNP host support available on Ubuntu 25.04

Confidential computing Article

Ubuntu 25.04 introduces full AMD SEV-SNP host support, making Ubuntu the first production-grade Linux distribution to deliver end-to-end confidential computing , from host to guest , without out-of-tree patches or experimental builds. With this release, enterprises can deploy confidential virtual machines on fully Ubuntu-based stacks in b ...


ijlal-loutfi
24 July 2023

Why do you also need confidential computing for your private datacenter?

Confidential computing Confidential computing

Confidential computing is not limited to public cloud environments; it also has significant value in private data centers. While private data centers offer data governance, control, and physical security, they are still vulnerable to insider attacks and share the same system software vulnerabilities as public cloud environments. By adopti ...


ijlal-loutfi
11 July 2023

Why you need to protect your confidential virtual machine from itself

Confidential computing Confidential computing

Confidential computing disrupts the traditional threat model by decoupling resource management from data access. It introduces new CPU security extensions like AMD SEV and Intel TDX, providing memory isolation through encryption and hardware access control mechanisms. While confidential computing protects against external threats, it’s im ...