{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"The Good Tech Companies ","title":"The Missing Layer in AI Security: Why \"Data-in-Use\" Is the Next Battleground","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/1aaa4058\"></iframe>","width":"100%","height":180,"duration":446,"description":"\n        This story was originally published on HackerNoon at: https://hackernoon.com/the-missing-layer-in-ai-security-why-data-in-use-is-the-next-battleground.\n             Confidential AI protects data while it’s being used, closing a major security gap as AI spreads into real workflows and critical infrastructure. \n            Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.\n            You can also check exclusive content about #ai-security, #confidential-computing, #private-ai, #data-in-use-security, #ai-infrastructure-security, #tee-attestation, #good-company, #hackernoon-top-story,  and more.\n            \n            \n            This story was written by: @ollm. Learn more about this writer by checking @ollm's about page,\n            and for more stories, please visit hackernoon.com.\n            \n                \n                \n                The average global breach cost will rise to $4.88M in 2024, up 10% from the previous year. In H1 2025 alone, 1,732 breaches exposed over 165 million records. Qatar's Bet: Confidential AI Gets Physical.\n        \n        ","thumbnail_url":"https://img.transistorcdn.com/HZ9CRzf5js9DK86xzUVMWBRbXYwg4dA8xVXJGVzpL6Y/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xMTNl/MjgwMmI0ZmEzNThj/YmJiOWNiN2UyZmRm/MzY3My5qcGVn.webp","thumbnail_width":300,"thumbnail_height":300}