HUB Blog

HUB Security Cyber News and Updates

Vehicles

A Gartner report from 2020 described Edge Computing as “part of a distributed computing topology in which information processing is located close to the edge — where things and people produce or consume that information.” The International Data Corporation predicts that more than half of new enterprise infrastructure will be at the edge by 2023, and worldwide spending on edge computing will reach $250 billion by 2024. According to Gartner Inc.’s research, data generated at the edge will increase from 10% today to 75% by 2025.

4IR

Artificial Intelligence, machine learning, and the algorithms that underpin them are everywhere. Think about all you did yesterday, and with not too much struggle, it should be possible to identify some aspect of every activity that uses them. Let's start with the first cup of coffee in order to pinpoint both 4IR's omnipresence and its invisibility. To make a cup of coffee in many modern homes, you need four elements: a cup, a capsule of coffee or loose beans, an espresso machine or equivalent, and water. If you prefer a cappuccino, milk is the fifth element. Invisibility is simple. You place the cup in the machine, press a button, and drink.

4ir

The Fourth Industrial Revolution (4IR) is already here. 4IR is an amalgamation of advanced capabilities mixing artificial intelligence (AI), robotics, the Internet of Things (IoT), quantum computing, genetic engineering, and other technologies. These articles seek to explain how widespread 4IR already is, the potential they hold for humankind, the multiple risks, and how to mitigate them.

HUB Security logo

HUB Security a provider of advanced cybersecurity hardware solutions and professional services, has announced this morning that it is exploring the possibility of listing the Company's shares on the NASDAQ stock exchange in the US (the “Listing”) The Company has commissioned a report from A-Labs Advisory & Finance Ltd.

Secure Edge Illustration

Securing the Edge

Edge computing – importance and functions: Of all computing paradigms, edge computing is the fastest growing. According to a Gartner report, “around 10% of enterprise-generated data is created and processed outside a traditional centralized data

London Tower

Many cybersecurity attacks these days are characterized by a stealth approach by hackers. The methods of gaining initial admission to a system are well-known. These include zero-day exploits, IT misconfigurations, coding errors and bugs, installation of malware by careless clicks or unauthorized hardware, phishing, social engineering, or brute force cracking of passwords.

Vehicles

Living Safely on the Edge

A Gartner report from 2020 described Edge Computing as “part of a distributed computing topology in which information processing is located close to the edge — where things and people produce or consume that information.”

The International Data Corporation predicts that more than half of new enterprise infrastructure will be at the edge by 2023, and worldwide spending on edge computing will reach $250 billion by 2024. According to Gartner Inc.’s research, data generated at the edge will increase from 10% today to 75% by 2025.

Read More »
4IR

4IR: The Invisible Revolution – Part Two

Artificial Intelligence, machine learning, and the algorithms that underpin them are everywhere. Think about all you did yesterday, and with not too much struggle, it should be possible to identify some aspect of every activity that uses them. Let’s start with the first cup of coffee in order to pinpoint both 4IR’s omnipresence and its invisibility. To make a cup of coffee in many modern homes, you need four elements: a cup, a capsule of coffee or loose beans, an espresso machine or equivalent, and water. If you prefer a cappuccino, milk is the fifth element. Invisibility is simple. You place the cup in the machine, press a button, and drink.

Read More »
4ir

4IR: The Invisible Revolution – Part One

The Fourth Industrial Revolution (4IR) is already here. 4IR is an amalgamation of advanced capabilities mixing artificial intelligence (AI), robotics, the Internet of Things (IoT), quantum computing, genetic engineering, and other technologies. These articles seek to explain how widespread 4IR already is, the potential they hold for humankind, the multiple risks, and how to mitigate them.

Read More »

Get the latest news from us.

As a subscriber you’ll get access to our products, updates and events!