HUB Blog

HUB Security Cyber News and Updates

HUB Security’s hardware solution allows a safe environment for machine learning and artificial intelligence processes to take place, while any concern for unwanted visibility between different models. By using Confidential Computing methods we allow for effective collaborative machine learning to take place, thus enabling previously unattainable ventures, in a secure environment.

Confidential computing diagram

Cutting Edge

For the experienced reader, edge computing should not be too hard to comprehend. In July 1969, Apollo 11 landed on the moon, in large part due to its innovative guidance system powered by its onboard

Dr.Wendy Ng

This week we had the pleasure to interview Dr. Wendy Ng, Cloud Security Architect Lead at OneWeb and discuss zero trust, software vulnerabilities and security practices. Dr. Wendy Ng will be a speaker on our next 'Zero-Trust Security Approach' online Summit this week.

colonial pipeline

The Colonial Pipeline reportedly paid hackers a ransom of $4.4 million in bitcoin soon after discovering the attack on its systems which began May 6th. In addition, the hackers also stole nearly 100 gigabytes of data from Colonial Pipeline and subsequently threatened to leak it in one of the most high-profile ransomware attacks of the last decade.

HUB Security for digital assets

Hub Security’s Vault HSM goes well beyond the average run-of-the-mill key management solution. HUB as a platform not only protects, isolates and insures your company’s digital assets, but also provides the infrastructure you need to access and use them securely. With the ability to set custom internal policies and permissions, organizations big or small can now use the HUB platform to defend against ongoing threats to their security’s IT infrastructure.

loT and Edge Computing

How IoT and Edge Computing Are Shaping Healthcare Cybersecurity

With healthcare providers requiring constant access to patient data, the fear of potential data leaks is already high and efforts to safeguard patients are driving higher security budgets across the sector. Edge computing means security along the network perimeter is decentralized, forcing enterprises to be far more vigilant of the privacy of end-users –– as well as compliant to increasingly stringent regulation.

Read More »
secure building

Zero-Trust Confidential Computing for Legacy Systems

The HUB Vault is an ultra-secure hardware and software confidential computing platform designed to protect your most valuable legacy systems and applications. The programmable and customizable MultiCore confidential compute platform enables companies a simple, flexible, and scalable digital transformation to the cloud regardless of legacy model.

Read More »

Get the latest news from us.

As a subscriber you’ll get access to our products, updates and events!