Hub Security https://hubsecurity.io Military grade digital key and identity management solution HSM Fri, 07 Aug 2020 11:21:34 +0000 en-US hourly 1 https://wordpress.org/?v=5.4.2 https://hubsecurity.io/wp-content/uploads/2020/02/cropped-Screen-Shot-2019-12-15-at-10.02.59-32x32.pngHub Securityhttps://hubsecurity.io 32 32 The Cyber Risks of Two-Factor Authenticationhttps://hubsecurity.io/the-cyber-risks-of-two-factor-authentication/ https://hubsecurity.io/the-cyber-risks-of-two-factor-authentication/#respond Fri, 07 Aug 2020 11:19:52 +0000 https://hubsecurity.io/?p=3837  On July 15th, the popular social media site Twitter was hacked causing a disruption in service for users as internal security teams scrambled to mitigate damage. Using social engineering and SIM swapping, hackers were able to successfully access Twitter’s admin panel made only available to internal support teams. The results were over 130 hacked […]

The post The Cyber Risks of Two-Factor Authentication appeared first on Hub Security.

]]>
 

On July 15th, the popular social media site Twitter was hacked causing a disruption in service for users as internal security teams scrambled to mitigate damage. Using social engineering and SIM swapping, hackers were able to successfully access Twitter’s admin panel made only available to internal support teams. The results were over 130 hacked user accounts and $120,000 worth of funds stolen from victims of a vicious phishing attack.

By hacking a company Slack channel hosting system admin credentials, hackers were able to gain access to employee accounts and even bypass two-factor authentication (2FA) –– a security policy often cited by security experts as a ‘necessary’ tool to safeguard company data.

In a breakdown of the incident, custodian of the @6 account, Lucky225, said the attackers got around 2FA by first resetting the associated email address, then revoking 2FA, and finally resetting passwords.

This worked to their advantage, as when a Twitter employee updates the email address on file, it doesn’t send a notification to the owner of the account,” Lucky said. “So after the email address is updated, an email about 2FA being revoked goes to the new email address.

While what happened is clear, how it happened highlights major internal security flaws many companies still hold when relying on two-factor authentication as a fallback method for safeguarding employee access and security.

Phishing attacks are only successful because of the psychological manipulation of social engineering. By using well-known security methods like 2FA, cybercriminals not only manipulate victims into handing over sensitive personal data but also reinforce a false sense of security for employees and company admins.

What is 2FA?

While it’s true that 2FA is a legitimate method of secondary security that in many cases has the potential to prevent phishing and ransomware attacks, it’s not as foolproof as many believe. As we’ve seen, cybercriminals are always one step ahead of the experts –– and they’ve learned to adapt to a world with 2FA.

2FA allows users to authenticate their identity using two separate authentication methods, such as a username and password coupled with a randomized or memorized pin/code. ATMs are good examples of systems that rely on two-factor authentication –– for customers to access their account, they must present a debit card as well as a private pin. Financial institutions that provide digital services often require 2FA as a default security method where a randomized pin can be delivered via email, text message, or phone call.

2FA Risks & Flaws

The primary flaw in 2FA is that it’s only as strong as the trust its users place in it. Once a user receives a phishing message requesting them to log in to their account, the manipulation of social engineering begins. Next, the user may enter their username, password, and 2FA information into a site completely unaware it is a phishing site designed to convince them they are logging in to their real account. Since the user seemingly trusted the phishing site, they easily gave away their credentials and rendered 2FA useless.

In addition, 2FA data can also be recorded in session cookies. Once a victim adds their 2FA code to a website, a hacker has the ability to sniff session cookies from a developer tool in a web browser. Using the session cookie, hackers have no need for a victim’s username and password –– they simply need to paste the session cookie into a browser to log in to the victim’s account.

Conclusion

What happened to Twitter is first and foremost a huge shame and the social media giant tweeted that it is still investigating the breach and is “rolling out additional company-wide training” to mitigate the effectiveness of social engineering and phishing attacks on its employees. “We’re embarrassed, we’re disappointed, and more than anything, we’re sorry.”

 

The post The Cyber Risks of Two-Factor Authentication appeared first on Hub Security.

]]>
https://hubsecurity.io/the-cyber-risks-of-two-factor-authentication/feed/ 0
Critical Infrastructure Securityhttps://hubsecurity.io/critical-infrastructure-security/ https://hubsecurity.io/critical-infrastructure-security/#respond Wed, 22 Jul 2020 17:01:49 +0000 https://hubsecurity.io/?p=3778  From a cyberattack on a nuclear power plant to an exposed electrical grid, every government holds the responsibility of protecting its citizens from harm. This is why critical infrastructure security is essential to protecting countries against natural disasters, terrorist activities, and harmful cyber threats. From energy institutions to transportation companies, all sectors of critical […]

The post Critical Infrastructure Security appeared first on Hub Security.

]]>
 

From a cyberattack on a nuclear power plant to an exposed electrical grid, every government holds the responsibility of protecting its citizens from harm. This is why critical infrastructure security is essential to protecting countries against natural disasters, terrorist activities, and harmful cyber threats. From energy institutions to transportation companies, all sectors of critical infrastructure require the highest standard and disaster preparedness, including chemical, financial and healthcare sectors.

16 Critical Infrastructure Sectors

  • Chemical Sector
  • Commercial Facilities Sector
  • Communications Sector
  • Critical Manufacturing Sector
  • Dams Sector
  • Defense Industrial Base Sector
  • Emergency Services Sector
  • Energy Sector
  • Financial Services Sector
  • Food and Agriculture Sector
  • Government Facilities Sector
  • Healthcare and Public Health Sector
  • Information Technology Sector
  • Nuclear Reactors, Materials and Waste Sector
  • Transportation Systems Sector
  • Water and Wastewater Systems Sector

What is Critical Infrastructure Security

Common components of critical infrastructure include Industrial Control Systems (ICS), Operation Technology (OT), and SCADA Systems, all of which require preventative cybersecurity preparedness. In today’s connected environments, digital and physical systems are converging and systems that once stood alone managing critical infrastructure operations are now connected, bringing with it a whole sleuth of new security concerns.

Having a Critical Infrastructure Protection plan in place can help organizations prepare for and prevent serious incidents involving critical infrastructure environments. To protect against an ever-growing number of threats, security experts must re-examine the integrity of critical infrastructure systems regularly, ensuring they hold up against unique threats and attacks.

While system or network security almost always incites thoughts of hacker or terrorist threats, many other exposures that should also be taken into consideration when examining the viability of a CIP plans, such as equipment failure, human error and natural causes. While preventing attacks takes a combination of knowledge, technology and skill, it also requires a security-aware culture.

Join us this Thursday, July 23rd for a discussion on Critical Infrastructure #Security with Hub Security’s CTO Andrey Iaremenko.

The post Critical Infrastructure Security appeared first on Hub Security.

]]>
https://hubsecurity.io/critical-infrastructure-security/feed/ 0
Webinar: UK Market Financial Challenges 2020https://hubsecurity.io/webinar-uk-market-financial-challenges-2020/ https://hubsecurity.io/webinar-uk-market-financial-challenges-2020/#respond Mon, 20 Jul 2020 13:05:33 +0000 https://hubsecurity.io/?p=3766We hosted on July 9th the webinar ‘UK Market Financial Challenges 2020’. In case you missed it, you can find below the recording. Thanks to our speakers: Otni Oron, Fintech Sector Manager – UK Israel Tech Hub at British Embassy IsraelGuy Israel, VP at MV CreditShterny Isseroff – Freelance writer and Journalist   https://youtu.be/_k2__TdBf34https://youtu.be/gD4Vb0t9TEghttps://youtu.be/qNTjZBpemyg

The post Webinar: UK Market Financial Challenges 2020 appeared first on Hub Security.

]]>

We hosted on July 9th the webinar ‘UK Market Financial Challenges 2020’. In case you missed it, you can find below the recording.

Thanks to our speakers:

Otni Oron, Fintech Sector Manager – UK Israel Tech Hub at British Embassy Israel
Guy Israel, VP at MV Credit
Shterny Isseroff – Freelance writer and Journalist

The post Webinar: UK Market Financial Challenges 2020 appeared first on Hub Security.

]]>
https://hubsecurity.io/webinar-uk-market-financial-challenges-2020/feed/ 0
The Case for Accelerated Hardware and the Programmable HSMhttps://hubsecurity.io/the-case-for-accelerated-hardware/ https://hubsecurity.io/the-case-for-accelerated-hardware/#respond Tue, 07 Jul 2020 08:08:27 +0000 https://hubsecurity.io/?p=3729  Now more than ever, electronic devices that are critical to our everyday life, from complex IoT infrastructures to national defense systems, are becoming more and more ubiquitous. Yet one huge problem remains for those attempting to safeguard the Internet’s newfound interconnectivity: the amount of computing power required. Many security experts have been questioning whether […]

The post The Case for Accelerated Hardware and the Programmable HSM appeared first on Hub Security.

]]>
 

Now more than ever, electronic devices that are critical to our everyday life, from complex IoT infrastructures to national defense systems, are becoming more and more ubiquitous. Yet one huge problem remains for those attempting to safeguard the Internet’s newfound interconnectivity: the amount of computing power required.

Many security experts have been questioning whether this new demand for computing power with built-in cyber protections will be delivered using software or purpose-built hardware.

Cyber Resilience Begins on a Hardware Level

The ugly truth is, any asset without proper KMS security built into either is at risk for a cyberattack. A safety-critical system cannot be considered truly safe without adequate cyber-protections.

While producers of connected cyber-physical systems are moving quickly to build robust protections into their products, many experts agree that the impact of a potential large-scale hardware attack could have devastating consequences on both customers, companies and the general public.

While software can easily be replaced, updated or downloaded, hardware can’t usually be altered after it leaves the factory which produced it. From the moment malicious hardware is built into a device, an attack can be executed in a wide variety of ways. For example, an attack can be internally triggered based on a calendar date or externally triggered using stored hidden malware.

These are just a few examples of many underlining the need to proactively address hardware security concerns before it’s too late. That’s why global security experts worldwide are in agreement: cyber-resilience begins with hyper-secure, high-performance hardware –– or accelerated hardware.

Cybersecurity Using Accelerated Hardware

Accelerated hardware is hardware specifically designed to perform certain functions more efficiently than would be possible using software running on a general-purpose central processing unit (CPU).

Using accelerated hardware, an operation can be computed faster than software running on a general CPU. Conducting tasks using specially-designed hardware can decrease latency, increase throughput, and increase parallelism. On a software-level, it can also lead to faster development, lower non-recurring engineering costs, and heightened portability.

Hub Security’s Hardware Security Module

Hub Security’s next-gen hardware security module offers a complete KMS solution to these common cybersecurity challenges. Hub’s combination of software and hardware-oriented cyber solutions all begin with an ultra-secure, quantum-proof and programmable HSM which leverages the benefits of accelerated hardware to promote both flexibility and efficiency.

Built on FPGAs which can handle more data per second than traditional CPU-based HSMs, Hub’s hardware enables organizations to protect themselves against massive novel cyber attacks –– no matter where they may arise.

Hub Security is excited to host the UK- Israel Tech Hub for a conversation on banking and finance challenges in 2020. Join us this Thursday.

The post The Case for Accelerated Hardware and the Programmable HSM appeared first on Hub Security.

]]>
https://hubsecurity.io/the-case-for-accelerated-hardware/feed/ 0
Hub Security Releases First-of-its-kind Quantum-proof Programmable HSMhttps://hubsecurity.io/hub-security-releases-first-of-its-kind-quantum-proof-hsm/ https://hubsecurity.io/hub-security-releases-first-of-its-kind-quantum-proof-hsm/#respond Tue, 23 Jun 2020 11:14:53 +0000 https://hubsecurity.io/?p=3715TEL AVIV, Israel, June 22, 2020  Following the close of its $5 million Series A funding round in late April, cybertech company Hub Security today unveiled its next-gen programmable Hardware Security Module (HSM), the first to offer quantum-proof capabilities to enterprises. The new solution includes hardware-embedded support for quantum-resistant algorithms as well as quantum source of […]

The post Hub Security Releases First-of-its-kind Quantum-proof Programmable HSM appeared first on Hub Security.

]]>
TEL AVIV, Israel, June 22, 2020 Following the close of its $5 million Series A funding round in late April, cybertech company Hub Security today unveiled its next-gen programmable Hardware Security Module (HSM), the first to offer quantum-proof capabilities to enterprises. The new solution includes hardware-embedded support for quantum-resistant algorithms as well as quantum source of randomness –– features designed to protect against the next generation of cyber threats and attacks.

Quantum computing is rapidly advancing. IBM predicted in 2018 that quantum computing would be mainstream by 2023. IDC predicted in 2019 that “25% of the Fortune Global 500 will gain competitive advantage from quantum computing” by 2023. When quantum computing comes of age, today’s encryption standards will no longer be secure and any data protected by them will no longer be private. That could usher in a wave of cyberattacks targeting organizations’ most sensitive information.

Hub Security’s newest flexible HSM will help organizations weather the coming evolution of cyberattacks and threats related to quantum computing. While current industry-standard HSMs are equipped to run quantum computing algorithms, many of them provide these capabilities purely on a software level, making them low-performing and unsuitable for cloud and payment processing and other real-world applications.

“Within five to 10 years, quantum computing will be ubiquitous, and many companies that have heavily invested in cybersecurity will need to toss their current HSMs in exchange for high-performing quantum-proof devices,” says Hub Security CTO, Andrey Iaremenko. “It’s going to be a stark wake-up call for many industry leaders and enterprise organizations when they realize their investments in cyber protection don’t go far enough to secure their company’s––and customers’––most sensitive digital assets.”

Hub Security’s customizable HSM offers high-performance military-grade key management and cryptographic solutions built on FPGAs. Now coupled with its latest quantum-proof release, the company will enable cloud and enterprise industries to safeguard against massive attacks by novel and critical cyber threats.

As a growing number of industries turn to cloud and data storage, there is an increasing demand for cybersecurity solutions that can combat the unique threats they face. Hub Security’s miniHSM is the first-of-its-kind pocket-sized HSM solution coupled with an ultra-secure HSM-to-HSM communication layer built uniquely for cloud, banking, healthcare, and government enterprises with scalable, air-tight security that can support any cloud-based or digital asset.

Hub Security utilizes military-grade cybersecurity principles for its customizable HSM and handheld miniHSM devices’ architecture that is designed for FIPS140-2 Level 4 protection (pending) –– the highest protection level currently available on the market for mobile cryptographic security.

The company’s combination of hardware and software solutions includes ultra-secure internal signing and authorization flow with a multi-signature vault, hardware firewall, access control, rules, policy engines and an AI-learning system designed to anticipate unique cyberattacks.

About Hub Security

Hub Security is a top-tier, military-grade provider of HSM and key management solutions for fintech, cloud, and blockchain security. Leveraging military-grade cybersecurity tactics and utilizing cutting-edge innovations, Hub Security has developed a family of products that provide the highest level of enterprise security available on the market today. https://hubsecurity.io/

The post Hub Security Releases First-of-its-kind Quantum-proof Programmable HSM appeared first on Hub Security.

]]>
https://hubsecurity.io/hub-security-releases-first-of-its-kind-quantum-proof-hsm/feed/ 0
What Is Real Estate Tokenizationhttps://hubsecurity.io/what-is-real-estate-tokenization/ https://hubsecurity.io/what-is-real-estate-tokenization/#respond Mon, 15 Jun 2020 14:10:50 +0000 https://hubsecurity.io/?p=3706  As blockchain-powered solutions expand far beyond the financial industry, investors are beginning to turn their eye to the use of cross-industry tokenization. Blockchain’s decentralized and transparent characteristics make it appreciated by banks, investors, and logistic experts alike –– as its potential applications are innumerable and far reaching. Now global governments have begun testing the […]

The post What Is Real Estate Tokenization appeared first on Hub Security.

]]>
 

As blockchain-powered solutions expand far beyond the financial industry, investors are beginning to turn their eye to the use of cross-industry tokenization. Blockchain’s decentralized and transparent characteristics make it appreciated by banks, investors, and logistic experts alike –– as its potential applications are innumerable and far reaching.

Now global governments have begun testing the waters of blockchain’s potential when it comes to property tokenization by putting certain property-related issues onto the blockchain.

Real Estate and Tokenization

The value of asset tokenization is particularly relevant in real estate markets, which is by far the largest asset class in terms of global asset value. According to a report, the size of the professionally managed global real estate investment market grew from $7.4 trillion in 2016 to $8.5 trillion in 2017.

Without question, home equity as a source of capital remains a global trend –– even if subject to market volatility. It still remains one of the safest places to place wealth, so it’s not surprising it’s going digital.

From enhanced liquidity to lower transaction costs and faster processes, tokenization of one of the world’s largest asset classes will undeniably change the way we buy, sell, and trade property in the not so distant future.

How Real Estate Tokenization Works

In a nutshell, tokenization is the process of transforming an asset into a digitally represented token. In the same sense, real estate tokenization is the process of digitizing the value and the ownership of property into a token –– or multiple fractional tokens –– that can be distributed among investors.

This process gives the property holder the right to own a portion of the property legally, and the creator of the token increased liquidity of funds.

Another set of advantages of tokenizing property assets are increased investment opportunities. By bringing in a large pool of global investors who would want to invest in real estate in other countries, new investment opportunities are expanded through an increase of asset liquidity and implementation of collective management use cases.

What Real Estate Can Be Tokenized?

Since tokenization is fairly flexible, a token could represent ownership of an underlying real asset, an equity interest in a legal entity, interest in a debt secured by the asset, or even a right to share in profits arising from use of the asset. Use cases are endless and new investment opportunities are still yet to be explored.

Even the types of property involved can vary. From single-family homes to office buildings to retail spaces, and everything in between, real estate can be defined in a broad manner. While this may sound too good to be true, several models of real-estate tokenization are already being actively used, including:

  • Timeshares
  • Special-purpose vehicles
  • Shares in real estate funds
  • Loans to development projects
  • Tokenized REITS

Join Hub Security’s TokenSoft’s CEO Mason Borda and CRO David Hochhauser online this Thursday, June 18th for a discussion on Real Estate Tokenization.

The post What Is Real Estate Tokenization appeared first on Hub Security.

]]>
https://hubsecurity.io/what-is-real-estate-tokenization/feed/ 0
Aviation Industry Grapples with Basic Cyber Protectionhttps://hubsecurity.io/aviation-industry-grapples-with-basic-cyber-protection/ https://hubsecurity.io/aviation-industry-grapples-with-basic-cyber-protection/#respond Mon, 15 Jun 2020 14:06:51 +0000 https://hubsecurity.io/?p=3703  EasyJet, one of UK’s largest budget airlines disclosed to its customers in March that a massive data breach had taken place, affecting nine million of its customers and involving over 2,000 credit-card details. EasyJet now reports it has been the target of a “highly sophisticated” attack, which provided hackers with access to customers’ email […]

The post Aviation Industry Grapples with Basic Cyber Protection appeared first on Hub Security.

]]>
 

EasyJet, one of UK’s largest budget airlines disclosed to its customers in March that a massive data breach had taken place, affecting nine million of its customers and involving over 2,000 credit-card details.

EasyJet now reports it has been the target of a “highly sophisticated” attack, which provided hackers with access to customers’ email addresses and 2,208 credit-card details.

EasyJet’s data breach dwarfs a 2018 British Airways data breach, which was fined $225m last year by the Information Commissioner’s Office under Europe’s General Data Protection Regulation (GDPR).The airline industry is already facing major challenges as many aircraft carriers are facing service disruptions due to the pandemic. Additionally, there is a legal battle being fought in courts by the directors of the carriers over business strategy approaches.

The latest hack signals how imperative it is for enterprise airlines to ensure Infosecurity best practices are put in place in order to avoid future devastating data breaches from taking place. The industry as a whole lacks strict requirements to prevent such incidents or even adhere to specific cybersecurity standards.

Aviation Security Challenges

With one of the most integrated and complex information and communications technology (ICT) systems, the aviation industry faces threats on a number of fronts with its increasing interconnectivity. From data theft to national and political motivations, today’s aviation industry faces multiple cyber risks on a multi-front war.

Common threats to the aviation industry include, but are not limited to:

1. Phishing Attacks

Last year the Center for Internet Security reported that 75 US airports were the targets of advanced persistent threats.

2. Jamming Attacks

Jamming attacks occur when an attacker injects a ghost flight into the air traffic control system.

3. Remote Hijacking

Security flaws in the software and hardware used for communication in the aviation industry allows hackers to remotely attack or control in-flight and on-board systems.

4. DDoS and Botnet Attacks

Distributed-denial-of-service attacks utilize botnets of compromised networks to flood air traffic control and other critical systems, resulting in the platform crashing.

5. WiFi-based Attacks

Vulnerabilities in a plane’s onboard system could allow hackers to use the onboard WiFi signal or in-flight entertainment systems to hack into the plane’s avionics equipment.

HSM for Aviation

The increased wave of security concerns for airlines has continued to ripple across the aviation industry. The growing consensus among security experts outlines the need for air-tight security solutions that will address the threat of malicious hacking attempts and data theft.

Hub Security’s next-gen HSM offers excellent performance military-grade key management and cryptographic solutions built on FPGAs which can handle more data per second than traditional CPU based  HSMs.  enabling  safeguard against massive attacks of novel and critical cyber threats in cloud and enterprise industries.

Hub Security’s combination of hardware and software solutions includes ultra-secure internal signing authorization flow. Designed with a multi-signature vault, hardware firewall, access control, and a deep neural network learning system, Hub Security’s Hsm is built to anticipate and prevent unique aviation attacks.

Join Hub Security’s TokenSoft’s CEO Mason Borda and CRO David Hochhauser online this Thursday, June 18th for a discussion on Real Estate Tokenization.

The post Aviation Industry Grapples with Basic Cyber Protection appeared first on Hub Security.

]]>
https://hubsecurity.io/aviation-industry-grapples-with-basic-cyber-protection/feed/ 0
What is Homomorphic Encryptionhttps://hubsecurity.io/what-is-homomorphic-encryption/ https://hubsecurity.io/what-is-homomorphic-encryption/#respond Fri, 12 Jun 2020 14:02:14 +0000 https://hubsecurity.io/?p=3692  Technology is changing rapidly around us daily and a growing number of organizations are implementing service to improve their security and levels of productivity. However, as we enter the new generation of connectivity and exponential growth of personal data generation and collection, we must re-examine the entire idea of security and the ecosystem that […]

The post What is Homomorphic Encryption appeared first on Hub Security.

]]>
 

Technology is changing rapidly around us daily and a growing number of organizations are implementing service to improve their security and levels of productivity. However, as we enter the new generation of connectivity and exponential growth of personal data generation and collection, we must re-examine the entire idea of security and the ecosystem that connects all its moving parts.

Many common services, such as cloud data storage, are not as secure as they may seem. These vulnerable endpoints leave companies at high-risk for any number of cyberattacks, ranging from data breaches to ransomware schemes with far-reaching consequences for entire organizations. That’s where homomorphic encryption comes in.

Homomorphic Encryption

Homomorphic encryption is a method of encryption that allows computations and queries to be performed upon fully encrypted data, making it possible to analyze or manipulate encrypted data without decrypting it.

Since most data theft occurs while data is being temporarily decrypted for us or stored as plain text, homomorphic encryption allows anyone to perform operations on data without the need to first decrypt it –– making the entire system safer from data theft and privacy violations.

The risk of privacy leakage of sensitive information in complex IT systems can’t be ignored, and there is a growing interest in applying homomorphic technology to provide data privacy and decentralized access to organizational data.

Applications of Homomorphic Encryption

In the real-world, homomorphic encryption has a number of practical, industry-relevant applications. From electronic voting systems to protecting information on the cloud to enabling private queries in search engines. Real-world applications for homomorphic encryption can include:

1. Securing Cloud Storage

Whether your organization uses a third-party cloud storage service or has only some data offloaded to the cloud, it’s critical to never fully trust the security of your cloud software-as-a-service (SaaS) provider.

It’s already well known that cloud storage isn’t always as secure as we’d like it to be. The remnants of which can still be seen from The Wall Street Journal’s investigation into the global hacking campaign called ‘Cloud Hopper.’

Not only does homomorphic encryption have the potential to secure data stored on the cloud, but it also retains the ability to calculate and search ciphered information that you can later decrypt. This is super important to safeguarding the integrity of your data as a whole –– a win-win scenario for security experts, organizations and customers.

2. Enabling Data Analytics

Homomorphic encryption allows safe and secure access to data for researchers. Without the need to decrypt, data can be encrypted and outsourced to commercial cloud environments for research purposes — all while keeping patient data secure.

Homomorphic encryption can be used for businesses and organizations across a number of industries, including but not limited to, finance, retail and healthcare. By allowing predictive analytic service providers to safely analyze medical data without putting data privacy at risk, homomorphic encryption is empowering research teams worldwide and the advancement of new technological developments.

3. Improving Election Security and Transparency.

It’s been a hot topic lately, but researchers are now looking into how to use homomorphic encryption to make democratic elections more secure and transparent. The Paillier encryption scheme, for example, uses additional operations and would be best suited for voting-related applications.

By allowing users to add various values in an unbiased manner, homomorphic encryption has the ability to keep these values private. This kind of technology has huge potential to not only protect data from unwanted manipulation, but also allow it to be used to independently verify results by authorized third-parties.

Hub Security’s Flexible miniHSM

Hub Security’s programmable HSM is a high-performance key management and cryptographic KMS solution built on FPGAs –– designed to protect against unique cyberattacks. Hub Security’s miniHSM is the first of its kind to offer a pocket-sized customizable HSM solution coupled with an ultra-secure HSM-to-HSM communication layer for air-tight security that can support any cloud-based or digital asset.

Learn More

The post What is Homomorphic Encryption appeared first on Hub Security.

]]>
https://hubsecurity.io/what-is-homomorphic-encryption/feed/ 0
Digital Wallet for Enterpriseshttps://hubsecurity.io/digital-wallet-for-enterprises/ https://hubsecurity.io/digital-wallet-for-enterprises/#respond Tue, 09 Jun 2020 09:29:25 +0000 https://hubsecurity.io/?p=3643We had the pleasure to host the webinar ‘Digital Wallets for Enterprises’ last week. On the event we hosted Vipin Bharatha, an industry expert for blockchain and digital assets, along side David Hochhauser, Hub Security’s CRO. See the full recording below    https://youtu.be/enjGIoRXZSk

The post Digital Wallet for Enterprises appeared first on Hub Security.

]]>
We had the pleasure to host the webinar ‘Digital Wallets for Enterprises’ last week. On the event we hosted Vipin Bharatha, an industry expert for blockchain and digital assets, along side David Hochhauser, Hub Security’s CRO. See the full recording below  

The post Digital Wallet for Enterprises appeared first on Hub Security.

]]>
https://hubsecurity.io/digital-wallet-for-enterprises/feed/ 0
Webinar Video – IoT Cyber Vulnerabilities, smart cities and beerhttps://hubsecurity.io/webinar-video-iot-cyber-vulnerabilities-smart-cities-and-beer/ https://hubsecurity.io/webinar-video-iot-cyber-vulnerabilities-smart-cities-and-beer/#respond Wed, 03 Jun 2020 18:38:16 +0000 https://hubsecurity.io/?p=3634Last week Hub Security CTO, Andrey Iaremenko, discussed IoT cyber vulnerabilities. The topics discussed included also security risks with smart cities, cars and homes. See below the webinar intro to IoT, IoT vulnerabilities and the full webinar recording. Intro to IoT IoT Cyber Vulnerabilities IoT and Beer – Full Webinar

The post Webinar Video – IoT Cyber Vulnerabilities, smart cities and beer appeared first on Hub Security.

]]>
Last week Hub Security CTO, Andrey Iaremenko, discussed IoT cyber vulnerabilities. The topics discussed included also security risks with smart cities, cars and homes.See below the webinar intro to IoT, IoT vulnerabilities and the full webinar recording. 

Intro to IoT

IoT Cyber Vulnerabilities

IoT and Beer - Full Webinar

The post Webinar Video – IoT Cyber Vulnerabilities, smart cities and beer appeared first on Hub Security.

]]>
https://hubsecurity.io/webinar-video-iot-cyber-vulnerabilities-smart-cities-and-beer/feed/ 0