Confidential Computing: The next frontier in data protection