Author: Doron Gez

HUB Vault HSM
cloud security

HUB Security Multicore Vault HSM

The HUB Vault HSM is an ultra-secure hardware and software platform, made to protect your most valuable digital assets, keys, applications and sensitive organisational processes.

Read More »
LS International
cloud security

Hub Security Partners with Global IT Provider LS International

Tel-Aviv based cybertech firm Hub Security has now announced another strategic partnership with LS International. The new deal will extend LS International’s specialized combination of cybersecurity products and industry-leading security solutions to enterprises, remote management and cloud services.

Read More »
HUB Security HSM and miniHSM
banking

What Is a Hardware Security Module?

A hardware security module (HSM) is a dedicated cryptographic processor designed to protect highly critical and sensitive keys and assets. HSMs act as trust anchors that protect the cryptographic infrastructure of some of the most security-conscious organizations in the world. This piece of hardware may look small, but is mighty powerful. It has the ability to securely manage, process, and store cryptographic keys inside its hardened, tamper-resistant shell.

Read More »
Critical Infrastructure Security
critical infrastructure security

Critical Infrastructure Security

rom a cyberattack on a nuclear power plant to an exposed electrical grid, every government holds the responsibility of protecting its citizens from harm. This is why critical infrastructure security is essential to protecting countries against natural disasters, terrorist activities, and harmful cyber threats.

Read More »
Cyber Security

Hub Security Releases First-of-its-kind Quantum-proof Programmable HSM

Hub Security’s newest flexible HSM will help organizations weather the coming evolution of cyberattacks and threats related to quantum computing. While current industry-standard HSMs are equipped to run quantum computing algorithms, many of them provide these capabilities purely on a software level, making them low-performing and unsuitable for cloud and payment processing and other real-world applications.

Read More »