CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 08, 2026

Niobium Introduces The Fog

Dark Reading Archived Apr 08, 2026 ✓ Full text saved
Full text archived locally
✦ AI Summary · Claude Sonnet


    ENDPOINT SECURITY PRESS RELEASES Niobium Introduces The Fog April 8, 2026 4 Min Read SOURCE: DARK READING PRESS RELEASE DAYTON, Ohio – April 2, 2026 – Niobium, a leader in hardware acceleration for fully homomorphic encryption (FHE), today introduced The Fog™, a private cloud infrastructure platform that enables organizations to run applications and AI workloads on data that remains encrypted at all times, even during computation. Like fog, nothing inside can be seen from the outside. Decryption keys remain exclusively with the data owner, and Niobium has no access to customer data at any stage of computation. The platform is now available in private beta, with a public launch targeted for late Q2 2026. The Fog redefines what organizations can do with their most sensitive and valuable data. Backed by FHE, which is mathematically proven to keep data private, The Fog enables organizations to use sensitive data without exposing it, addressing a longstanding challenge in cloud computing. This architecture enables full use of regulated data sets, secure collaboration across partners, and private AI and ML applications.  Related:Apple Breaks Precedent, Patches DarkSword for iOS 18 “For too long, organizations have had to accept data exposure as the cost of doing business in the cloud,” said Kevin Yoder, CEO of Niobium. “The Fog eliminates that tradeoff. We’re building a cloud platform where data can be used without ever being revealed. Our goal is to make encrypted computing practical, scalable, and accessible to the teams that need it most.” The Fog is a self-service encrypted cloud platform that allows developers and enterprises to provision servers and custom hardware, deploy FHE applications, and run production workloads without sharing decryption keys with any third party, including Niobium. Users manage every aspect through a unified cloud portal, simplifying access to encrypted compute infrastructure. To lead the cloud infrastructure buildout, Niobium has appointed Rob Sherrard as Head of Cloud. “Encrypted compute is the next platform shift, and we’re building the infrastructure that makes it not just possible, but inevitable,” said Sherrard. “Inside The Fog, computation happens entirely under encryption. Owners hold the keys, the fog never lifts, and the work still gets done.” FPGA Performance Today, ASIC Acceleration Ahead The Fog is designed to address the two primary barriers that have historically limited FHE adoption: performance and usability. The Fog launches on the mistic™ Core FPGA accelerator, delivering up to 2x faster FHE performance than any GPU or accelerator currently on the market. Niobium is also developing a purpose-built ASIC in partnership with SEMIFIVE and Samsung Foundry. The ASIC will deliver significantly higher performance while remaining fully software-compatible with applications built on The Fog today, allowing early users to transition seamlessly as new hardware becomes available. Related:CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry First FHE Applications The Fog will also launch with a library of pre-built FHE applications designed to demonstrate real-world encrypted compute use cases and to lower barriers to adoption. Initial applications include:  Encrypted Semantic Search (Secure RAG): Query sensitive data by meaning rather than exact match, protecting both the query and the underlying dataset throughout. Federated Learning: Train models across distributed, encrypted datasets without centralizing or exposing the underlying data. Machine Learning Classification (e.g. Network Intrusion Detection): Analyze encrypted data to identify patterns and threats without exposing underlying information.  Additional template applications are in development. Developer Access and Ecosystem The Fog is backed by a complete software ecosystem designed to make FHE accessible to developers without a background in cryptography. The stack includes a compiler, SDK, template applications, documentation, and a single pane of glass for managing hardware, applications, and workloads. Together, they turn FHE into a practical engineering tool. Related:Venom Stealer MaaS Platform Commoditizes ClickFix Attacks Private beta access to The Fog is available now. Early access participants receive: Early access to the mistic Core FPGA accelerator hardware First access to new platform features, applications, and performance updates ahead of public launch Direct engagement with the Niobium engineering and cryptography team Developers and organizations interested in early access can sign up and get more information at niobium.co. The Fog is targeting a Q2 2026 public launch. About Niobium Niobium is building the first dedicated hardware platform designed to advance fully homomorphic encryption (FHE) into commercial applications. FHE keeps data encrypted even during computation, mathematically guaranteeing privacy. Niobium’s accelerator hardware and The Fog™ encrypted cloud platform give developers and enterprises the tools to compute on sensitive data without ever exposing it. Niobium is headquartered in Dayton, Ohio, with offices in Portland, Oregon, and San Francisco, California. More information is available at niobium.co. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports AI SOC for MDR: The Structural Evolution of Managed Detection and Response How Enterprises Are Developing Secure Applications Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Gartner IGA Voice of the Customer 2026 Access More Research Webinars Security in the AI Age Identity Maturity Under Pressure: 2026 Findings and How to Catch Up Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need More Webinars You May Also Like ENDPOINT SECURITY Pro-Russian Hackers Use Linux VMs to Hide in Windows by Alexander Culafi NOV 04, 2025 ENDPOINT SECURITY We've All Been Wrong: Phishing Training Doesn't Work by Nate Nelson, Contributing Writer JUL 01, 2025 ENDPOINT SECURITY Attackers Lace Fake GenAI Tools With Malware by Alexander Culafi, Senior News Writer, Dark Reading MAY 12, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 Editor's Choice CYBERSECURITY OPERATIONS RSAC 2026: AI Dominates, But Community Remains Key to Security byKristina Beek,Rob Wright APR 2, 2026 CYBERATTACKS & DATA BREACHES Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate byNate Nelson APR 2, 2026 3 MIN READ ENDPOINT SECURITY CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry byJeffrey Schwartz APR 3, 2026 3 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Security in the AI Age TUES, APRIL 28, 2026 AT 1PM EST Identity Maturity Under Pressure: 2026 Findings and How to Catch Up WED, MAY 6,2026 AT 1PM EST Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST More Webinars White Papers How Sunrun Transformed Security Operations with AiStrike Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity Explore More White Papers BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Apr 08, 2026
    Archived
    Apr 08, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗