Blog

Photo by Pankaj Patel on Unsplash

The Cyber Risks of Two-Factor Authentication

  On July 15th, the popular social media site Twitter was hacked causing a disruption in service for users as internal security teams scrambled to mitigate damage. Using social engineering and SIM swapping, hackers were able to successfully access Twitter’s admin panel made only available to internal support teams....

Read More
Photo by Saad Salim on Unsplash

Critical Infrastructure Security

  From a cyberattack on a nuclear power plant to an exposed electrical grid, every government holds the responsibility of protecting its citizens from harm. This is why critical infrastructure security is essential to protecting countries against natural disasters, terrorist activities, and harmful cyber threats. From energy institutions to...

Read More

Webinar: UK Market Financial Challenges 2020

We hosted on July 9th the webinar ‘UK Market Financial Challenges 2020’. In case you missed it, you can find below the recording. Thanks to our speakers: Otni Oron, Fintech Sector Manager – UK Israel Tech Hub at British Embassy IsraelGuy Israel, VP at MV CreditShterny Isseroff – Freelance...

Read More
Photo by Ricardo Gomez Angel on Unsplash

The Case for Accelerated Hardware and the Programmable HSM

  Now more than ever, electronic devices that are critical to our everyday life, from complex IoT infrastructures to national defense systems, are becoming more and more ubiquitous. Yet one huge problem remains for those attempting to safeguard the Internet’s newfound interconnectivity: the amount of computing power required. Many...

Read More
Hub Security logo

Hub Security Releases First-of-its-kind Quantum-proof Programmable HSM

TEL AVIV, Israel, June 22, 2020  Following the close of its $5 million Series A funding round in late April, cybertech company Hub Security today unveiled its next-gen programmable Hardware Security Module (HSM), the first to offer quantum-proof capabilities to enterprises. The new solution includes hardware-embedded support for quantum-resistant algorithms...

Read More
Photo by Breno Assis on Unsplash

What Is Real Estate Tokenization

  As blockchain-powered solutions expand far beyond the financial industry, investors are beginning to turn their eye to the use of cross-industry tokenization. Blockchain’s decentralized and transparent characteristics make it appreciated by banks, investors, and logistic experts alike –– as its potential applications are innumerable and far reaching. Now...

Read More
Photo by Luka Slapnicar on Unsplash

Aviation Industry Grapples with Basic Cyber Protection

  EasyJet, one of UK’s largest budget airlines disclosed to its customers in March that a massive data breach had taken place, affecting nine million of its customers and involving over 2,000 credit-card details. EasyJet now reports it has been the target of a “highly sophisticated” attack, which provided...

Read More
Photo by Michael Dziedzic on Unsplash

What is Homomorphic Encryption

  Technology is changing rapidly around us daily and a growing number of organizations are implementing service to improve their security and levels of productivity. However, as we enter the new generation of connectivity and exponential growth of personal data generation and collection, we must re-examine the entire idea...

Read More

Digital Wallet for Enterprises

We had the pleasure to host the webinar ‘Digital Wallets for Enterprises’ last week. On the event we hosted Vipin Bharatha, an industry expert for blockchain and digital assets, along side David Hochhauser, Hub Security’s CRO. See the full recording below    https://youtu.be/enjGIoRXZSk

Read More

Webinar Video – IoT Cyber Vulnerabilities, smart cities and beer

Last week Hub Security CTO, Andrey Iaremenko, discussed IoT cyber vulnerabilities. The topics discussed included also security risks with smart cities, cars and homes. See below the webinar intro to IoT, IoT vulnerabilities and the full webinar recording. Intro to IoT IoT Cyber Vulnerabilities IoT and Beer – Full...

Read More

Webinar: Securing Remote Access

Hub Security’s Chief Product Officer Ido Helshtock joined OurCrowd’s Cyber Security webinar to discuss working remotely and secure access at current times.

Read More

The Pathway to Secure Remote Voting

A recent Senate memo released this week offered a peek into the US government’s efforts to leverage blockchain technology, with security as a core focus. The memo was drafted for a roundtable aimed at exploring the “Continuity of Senate Operations and Remote Voting in Times of Crisis.”  It outlines...

Read More
Scroll to top

JOIN OUR NEWSLETTER

Keep up with cyber security news!