HUB Blog

HUB Security Cyber News and Updates

HUB Security logo

HUB Security a provider of advanced cybersecurity hardware solutions and professional services, has announced this morning that it is exploring the possibility of listing the Company's shares on the NASDAQ stock exchange in the US (the “Listing”) The Company has commissioned a report from A-Labs Advisory & Finance Ltd.

Secure Edge Illustration

Securing the Edge

Edge computing – importance and functions: Of all computing paradigms, edge computing is the fastest growing. According to a Gartner report, “around 10% of enterprise-generated data is created and processed outside a traditional centralized data

London Tower

Many cybersecurity attacks these days are characterized by a stealth approach by hackers. The methods of gaining initial admission to a system are well-known. These include zero-day exploits, IT misconfigurations, coding errors and bugs, installation of malware by careless clicks or unauthorized hardware, phishing, social engineering, or brute force cracking of passwords.

HealthCare & AI Protection by HUB Security

HUB Security’s hardware solution allows a safe environment for machine learning and artificial intelligence processes to take place, while any concern for unwanted visibility between different models. By using Confidential Computing methods we allow for effective collaborative machine learning to take place, thus enabling previously unattainable ventures, in a secure environment.

Confidential computing diagram

Cutting Edge

For the experienced reader, edge computing should not be too hard to comprehend. In July 1969, Apollo 11 landed on the moon, in large part due to its innovative guidance system powered by its onboard

4IR

4IR: The Invisible Revolution – Part Two

Artificial Intelligence, machine learning, and the algorithms that underpin them are everywhere. Think about all you did yesterday, and with not too much struggle, it should be possible to identify some aspect of every activity that uses them. Let’s start with the first cup of coffee in order to pinpoint both 4IR’s omnipresence and its invisibility. To make a cup of coffee in many modern homes, you need four elements: a cup, a capsule of coffee or loose beans, an espresso machine or equivalent, and water. If you prefer a cappuccino, milk is the fifth element. Invisibility is simple. You place the cup in the machine, press a button, and drink.

Read More »
4ir

4IR: The Invisible Revolution – Part One

The Fourth Industrial Revolution (4IR) is already here. 4IR is an amalgamation of advanced capabilities mixing artificial intelligence (AI), robotics, the Internet of Things (IoT), quantum computing, genetic engineering, and other technologies. These articles seek to explain how widespread 4IR already is, the potential they hold for humankind, the multiple risks, and how to mitigate them.

Read More »
HUB Security logo

HUB Security Considers a NASDAQ Listing

HUB Security a provider of advanced cybersecurity hardware solutions and professional services, has announced this morning that it is exploring the possibility of listing the Company’s shares on the NASDAQ stock exchange in the US (the “Listing”) The Company has commissioned a report from A-Labs Advisory & Finance Ltd.

Read More »
Secure Edge Illustration

Securing the Edge

Edge computing – importance and functions: Of all computing paradigms, edge computing is the fastest growing. According to a Gartner report, “around 10% of enterprise-generated

Read More »

Get the latest news from us.

As a subscriber you’ll get access to our products, updates and events!