The Critical Need for Confidential Computing