Category: Cyber Security

Artificial Intelligence

Cutting Edge

For the experienced reader, Edge computing should not be too hard to comprehend. In July 1969, Apollo 11 landed on the moon, in large part

Read More »
cloud security

Zero Trust: Speaker Spotlight with Wendy Ng

This week we had the pleasure to interview Dr. Wendy Ng, Cloud Security Architect Lead at OneWeb and discuss zero trust, software vulnerabilities and security practices. Dr. Wendy Ng will be a speaker on our next ‘Zero-Trust Security Approach’ online Summit this week.

Read More »
critical infrastructure security

What We Can Learn in the Aftermath of the Colonial Pipeline Hack

The Colonial Pipeline reportedly paid hackers a ransom of $4.4 million in bitcoin soon after discovering the attack on its systems which began May 6th. In addition, the hackers also stole nearly 100 gigabytes of data from Colonial Pipeline and subsequently threatened to leak it in one of the most high-profile ransomware attacks of the last decade.

Read More »
HUB Security for digital assets
blockchain

HUB Vault Security for Enterprise Digital Assets Custody

Hub Security’s Vault HSM goes well beyond the average run-of-the-mill key management solution. HUB as a platform not only protects, isolates and insures your company’s digital assets, but also provides the infrastructure you need to access and use them securely. With the ability to set custom internal policies and permissions, organizations big or small can now use the HUB platform to defend against ongoing threats to their security’s IT infrastructure.

Read More »
Security threats facing AI and ML
Artificial Intelligence

Top 5 Security Threats Facing Artificial Intelligence and Machine Learning

An emerging space within AI is the need to share and access more big data from semi trusting parties in order to achieve better models and insights. A good example is multiple healthcare providers sharing images and their interpretation in order to create an AI model to detect anomalies on its own. The more images the better algorithm. This scenario requires the model to access data from all healthcare providers, but assure that images cannot be accessed by each individual healthcare provider to another.

Read More »