HUB Blog

HUB Security Cyber News and Updates

loT and Edge Computing

With healthcare providers requiring constant access to patient data, the fear of potential data leaks is already high and efforts to safeguard patients are driving higher security budgets across the sector. Edge computing means security along the network perimeter is decentralized, forcing enterprises to be far more vigilant of the privacy of end-users –– as well as compliant to increasingly stringent regulation.

secure building

The HUB Vault is an ultra-secure hardware and software confidential computing platform designed to protect your most valuable legacy systems and applications. The programmable and customizable MultiCore confidential compute platform enables companies a simple, flexible, and scalable digital transformation to the cloud regardless of legacy model.

colonial pipeline

What We Can Learn in the Aftermath of the Colonial Pipeline Hack

The Colonial Pipeline reportedly paid hackers a ransom of $4.4 million in bitcoin soon after discovering the attack on its systems which began May 6th. In addition, the hackers also stole nearly 100 gigabytes of data from Colonial Pipeline and subsequently threatened to leak it in one of the most high-profile ransomware attacks of the last decade.

Read More »
HUB Security for digital assets

HUB Vault Security for Enterprise Digital Assets Custody

Hub Security’s Vault HSM goes well beyond the average run-of-the-mill key management solution. HUB as a platform not only protects, isolates and insures your company’s digital assets, but also provides the infrastructure you need to access and use them securely. With the ability to set custom internal policies and permissions, organizations big or small can now use the HUB platform to defend against ongoing threats to their security’s IT infrastructure.

Read More »

Get the latest news from us.

As a subscriber you’ll get access to our products, updates and events!