HUB Blog

HUB Security Cyber News and Updates

HUB Security logo

HUB Security a provider of advanced cybersecurity hardware solutions and professional services, has announced this morning that it is exploring the possibility of listing the Company's shares on the NASDAQ stock exchange in the US (the “Listing”) The Company has commissioned a report from A-Labs Advisory & Finance Ltd.

Secure edge. Illustration

Securing the Edge

Edge computing – importance and functions: Of all computing paradigms, edge computing is the fastest growing. According to a Gartner report, “around 10% of enterprise-generated data is created and processed outside a traditional centralized data

Many cybersecurity attacks these days are characterized by a stealth approach by hackers. The methods of gaining initial admission to a system are well-known. These include zero-day exploits, IT misconfigurations, coding errors and bugs, installation of malware by careless clicks or unauthorized hardware, phishing, social engineering, or brute force cracking of passwords.

HUB Security’s hardware solution allows a safe environment for machine learning and artificial intelligence processes to take place, while any concern for unwanted visibility between different models. By using Confidential Computing methods we allow for effective collaborative machine learning to take place, thus enabling previously unattainable ventures, in a secure environment.

Confidential computing diagram

Cutting Edge

For the experienced reader, edge computing should not be too hard to comprehend. In July 1969, Apollo 11 landed on the moon, in large part due to its innovative guidance system powered by its onboard

HUB Security logo

HUB Security Considers a NASDAQ Listing

HUB Security a provider of advanced cybersecurity hardware solutions and professional services, has announced this morning that it is exploring the possibility of listing the Company’s shares on the NASDAQ stock exchange in the US (the “Listing”) The Company has commissioned a report from A-Labs Advisory & Finance Ltd.

Read More »
Secure edge. Illustration

Securing the Edge

Edge computing – importance and functions: Of all computing paradigms, edge computing is the fastest growing. According to a Gartner report, “around 10% of enterprise-generated

Read More »

Gaining immunity to privilege escalation

Many cybersecurity attacks these days are characterized by a stealth approach by hackers. The methods of gaining initial admission to a system are well-known. These include zero-day exploits, IT misconfigurations, coding errors and bugs, installation of malware by careless clicks or unauthorized hardware, phishing, social engineering, or brute force cracking of passwords.

Read More »

AI in Healthcare Security

HUB Security’s hardware solution allows a safe environment for machine learning and artificial intelligence processes to take place, while any concern for unwanted visibility between different models. By using Confidential Computing methods we allow for effective collaborative machine learning to take place, thus enabling previously unattainable ventures, in a secure environment.

Read More »

Get the latest news from us.

As a subscriber you’ll get access to our products, updates and events!