“Why should I employ a security consultant when I have Nessus at work?”
Blogs
Proactive and holistic approach to cybersecurity can ensure organizations’ integrity and...
As cyberattacks continue to rise, organizations must be more vigilant in protecting their...
Native Zero Trust Data Center is the next-generation approach to edge data center protection
Confidential computing and multi-cloud seem to complement each other perfectly and lead to enhanced...
HUB Security's Confidential Computing Platform offers the ability to protect running applications...
Solutions that enable BYOK (Bring Your Own Key) and client-side encryption capabilities enable a...
Dec 2022: HUB Security’s latest Secure Computing release addresses vulnerabilities in Kubernetes...
With the sophistication of cyber hacking techniques and the rapid growth of this malicious...
PCI DSS 4.0: Motives, Content, and Timeline Explained
Few people think twice about leaving their...
Introduction
The PCI DSS (Payment Card Industry Data Security Standard) defines any entity that is...
What is a Denial Of Service (DDOS)?
It all started 22 years ago , when “mafiaboy”, a 15-year-old...
As edge computing deployments continue to increase, it is likely that the usage of confidential...
There are clear advantages of Edge Computing solutions in the world of Industrial IoT (IIoT). These...
Confidential Computing offers an uncomplicated method of securing distributed edge computing,...
The Pounding Effects
How Can Data Resilience Improvements Optimize Cyber Insurance Offerings?
...
The cybersecurity industry has grown more complex as it grapples with the ever-increasing threat...
Our last post demonstrated that confidential computing is the only model that answers today’s...
According to FBI statements from 1981, hackers are 'tech experts; skilled, often young, computer...
Evidently, traditional methods of cybersecurity are not matching the capabilities of today’s...
The building blocks of quantum computing can be utilized to offer high levels of protection but,...
Do Your Best, but Plan For the Worst
In the previous article, we discussed why we can't guarantee...
You Must Assume There Is a Cyberattack Coming. Are You Prepared for It?
Companies, according to...As a policy instrument, kinetic warfare had mainly been abandoned by the West. In place of...
ISO 27002:2022 is out! It’s official – cybersecurity is the name of the game
At surface level, this...
The 4th Industrial Revolution, now commonly known as Industry 4, has continued its inexorable rise,...
IoT Adoption Is Intensifying and Cybersecurity Needs to Catch up
According to estimates, the number...Definition
The prevalent definitions and usage of the digital twins concept are focused on...
In recent weeks, a new danger that is highly infectious and evades protection has been unleashed...
Part 4: Keeping it safe
Dangers of 4IR
4IR is not only a valuable tool for corporations, it...
With COP26 Glasgow taking place today, here are some thoughts on confidential computing and...
Part 3: 4IR and Business Transformation
Types of AI
There are roughly two categories of...
What is Edge Computing?
A Gartner report from 2020 described Edge Computing as “part of a...
We had the pleasure to interview Mr. Bharath Ramesh, Head of HPE Edge AI Software & Solutions. In...
Part 2: Revolutionizing Your Morning Coffee
Part 1: Significance
What is 4IR?
The Fourth Industrial Revolution (4IR) is an amalgamation of...
As a sneak preview of our upcoming “Edge Computing and IoT” event, we sat down with Mr. Blaine...
October 12, 2021, TEL-AVIV, ISRAEL - HUB Security (“HUB” or the “Company”), a provider of advanced...
Edge Computing - Importance and Functions
Of all computing paradigms, edge computing is the...
Soviet intelligence would often recruit low-level military or industrial operatives during the...
HUB Security CEO, Eyal Moshe: "Comsec is a long-standing and valued global cyber-security company....
Securing Healthcare AI with Confidential Computing
Joint research, collaborative machine learning,...
Once, we used to compare computing power between Apollo 11’s guidance system and an iPhone....
TEL AVIV, Israel, Aug. 12, 2021 /PRNewswire/ - HUB Security Ltd. today announce a partnership with
This week we had the pleasure to interview Fred Streefland, Director Cybersecurity (CSO/DPO) EMEA...
For the experienced reader, edge computing should not be too hard to comprehend. In July 1969,...
Late June, Deutsche Börse Group announced that it had agreed to buy a two-thirds stake in...
On Tuesday, Joseph Blount, the CEO of Colonial Pipeline went before congress to testify regarding...
Data breaches come in all shapes and sizes. Systems breaches great and small have more than...
We had the opportunity to sit down for an interview with Malini Bhandaru, Ph.D., Open Source Lead...
Towards our online summit on June 10th, AI and Data Privacy we set down for an interview with...
Secure Edge: Today’s Necessity, Tomorrow’s Problem
Recently merged ALD announced a 50 million USD investment round, based on a 146 million USD...
Artificial Intelligence and Machine Learning (AI/ML) are strategic technologies for every data...
We are an information-heavy society. We don’t discuss it as often as we talk about the fuel we put...
Today more companies are providing global employees with remote access than ever, but with the...
This week we’re addressing confidential computing. In continue to our recent webinar Confidential...
Today, most computing is taking place in on-premise data centers or in the cloud - and healthcare...
This week we’re talking federated learning including its development and security risks. In honor...
AS/400, iSeries and IBM zSeries Mainframe
Traditionally, security models operate on the...
HUB Security announces the first-ever product enabling absolute data security on the edge based on...
Tel-Aviv based cybersecurity firm HUB Security has announced recently it has received final patent...
In a colossal data breach about a week ago, the personal data of more than half a billion Facebook...
Moving assets and critical computing to the cloud is just one way for organizations to offload...
“More than $41 billion worth of assets are locked in DeFi apps, yet their security solutions are...
- Upon merger completion, HUB Security will become the controlling shareholder of the merged...
With 90% of workloads running on a hosted cloud service in 2020, more organizations rely on the...
Before we cover our roundup of banking threats for 2021, it’s important to note that many of the...
Tezos Israel and HUB Security partner to develop a physical security module that will protect the...
The HUB Vault HSM is an ultra-secure and agile hardware and software platform, made to protect...
We introduced earlier this month our Confidential computing platform as part of our online events...
We introduced yesterday, October 27th, our Multicore Vault HSM as part of our online events series
Attacks on Critical Infrastructures present novel and sophisticated scenarios that can put entire...
Between growing security threats and evolving compliance regulations, global governments and...
The internet is more connected than ever. From tech support to record storage, today’s businesses...
TEL AVIV, Israel, Nov. 9, 2020 /PRNewswire/ - HUB Security, the Tel Aviv based cybersecurity firm...
A dedicated HSM for digital assets and custody management solutions made to protect your most...
TEL-AVIV, Israel, Oct. 26, 2020 /PRNewswire/ - Following the announcement of its quantum-proof...
TEL-AVIV, Israel, Oct. 1, 2020 /PRNewswire/ - HUB Security, a leading hardware cybersecurity...
HUB Security announced this week the use of its military-grade Vault HSM (Hardware Security...
TEL AVIV, Israel, Sept. 15, 2020 /PRNewswire/ - HUB Security, the cyber security platform, is...
A hardware security module (HSM) is a dedicated cryptographic processor designed to protect highly...
Two-Factor Authentication (2FA) is a legitimate method of secondary security but it’s not as...
From a cyberattack on a nuclear power plant to an exposed electrical grid, every government holds...
Now more than ever, electronic devices that are critical to our everyday life, from complex IoT...
TEL AVIV, Israel, June 22, 2020 Following the close of its $5 million Series A funding round in...
Technology is changing rapidly around us daily and a growing number of organizations are...
Last week HUB Security CTO, Andrey Iaremenko, discussed IoT cyber vulnerabilities. The topics...
A recent Senate memo released this week offered a peek into the US government’s efforts to leverage...
Watch Erez Baum, Seagate Lyve Labs Israel senior director and Eyal Moshe, HUB Security CEO discuss...
Today the world has become increasingly aware of the threat of cyber attacks and data breaches, but...
Die 5. EU-Geldwäscherichtlinie ist am 1. Januar 2020 in Kraft getreten und baut auf die 4....
The world has become increasingly aware of the threat of cyber attacks and data breaches, but not...
COVID-19 prevents people from coming to work and operating the on-premise security systems that...
EY announced in early March the launch of its Baseline protocol project. The new initiative is a an...
While the World Health Organization (WHO) hasn't declared the novel coronavirus a global pandemic...
A paper published February by the Depository Trust & Clearing Corporation (DTCC) calls for a more...
With the blockchain industry's value estimated to hit $23B by 2023, it's hard to keep track of the...
With the explosion of distributed ledger technology (DLT) as a safe and secure solution for...
Encryption requires high levels of cryptography and secrecy. Often encryption aids in the transfer...
The Fifth European Money Laundering directive came into effect January 1st, which updates a fourth...
More data and applications than ever are moving to the cloud, creating unique infosecurity...
The Spanish telecommunications giant Telefonica recently reported it will launch a new partnership...
Turkey's Takasbank announced the release of its blockchain-based gold-backed transfer system Dec....
With all the cyber threats that exist today, banks are more vulnerable than ever to becoming the...
As of January 1st, Illinois's Blockchain Technology Act took effect, opening the door for the legal...
In a weekly tech advice column, the FBI's Portland office recently released an ominous warning to...
There are some trends in the crypto-world that start as a snowball and grow into an avalanche....
Last Wednesday, accountancy giant Ernst & Young (EY) launched its token and smart contract review...
In a recent survey by the quantitative analysis firm Oxford Economics, 94 percent of State Street...
The Hong Kong Securities and Futures Commission (SFC) issued a position paper Nov. 6th defining a...
As the financial industry begins its long-awaited move to adaptive blockchain technology, many...
We wrote earlier this week about key management, and how today's solutions fail the little guy. On...
Data breaches come in all shapes and sizes. Today, any hacker from the comfort of their keyboard...