Category: Cyber Security

HUB Security logo
Cyber Security

HUB Security Considers a NASDAQ Listing

HUB Security a provider of advanced cybersecurity hardware solutions and professional services, has announced this morning that it is exploring the possibility of listing the Company’s shares on the NASDAQ stock exchange in the US (the “Listing”) The Company has commissioned a report from A-Labs Advisory & Finance Ltd.

Read More »
Cyber Security

Gaining immunity to privilege escalation

Many cybersecurity attacks these days are characterized by a stealth approach by hackers. The methods of gaining initial admission to a system are well-known. These include zero-day exploits, IT misconfigurations, coding errors and bugs, installation of malware by careless clicks or unauthorized hardware, phishing, social engineering, or brute force cracking of passwords.

Read More »
Confidential computing diagram
Artificial Intelligence

Cutting Edge

For the experienced reader, edge computing should not be too hard to comprehend. In July 1969, Apollo 11 landed on the moon, in large part

Read More »
Dr.Wendy Ng
cloud security

Zero Trust: Speaker Spotlight with Wendy Ng

This week we had the pleasure to interview Dr. Wendy Ng, Cloud Security Architect Lead at OneWeb and discuss zero trust, software vulnerabilities and security practices. Dr. Wendy Ng will be a speaker on our next ‘Zero-Trust Security Approach’ online Summit this week.

Read More »
colonial pipeline
critical infrastructure security

What We Can Learn in the Aftermath of the Colonial Pipeline Hack

The Colonial Pipeline reportedly paid hackers a ransom of $4.4 million in bitcoin soon after discovering the attack on its systems which began May 6th. In addition, the hackers also stole nearly 100 gigabytes of data from Colonial Pipeline and subsequently threatened to leak it in one of the most high-profile ransomware attacks of the last decade.

Read More »
HUB Security for digital assets

HUB Vault Security for Enterprise Digital Assets Custody

Hub Security’s Vault HSM goes well beyond the average run-of-the-mill key management solution. HUB as a platform not only protects, isolates and insures your company’s digital assets, but also provides the infrastructure you need to access and use them securely. With the ability to set custom internal policies and permissions, organizations big or small can now use the HUB platform to defend against ongoing threats to their security’s IT infrastructure.

Read More »