Alon Saban

VP of Corporate Development at HUB Security

Confidential Computing: Secure the Battlefield

Cyber Warfare has become the fifth dimension for overt and covert combat systems.

Securing the Edge

Of all computing paradigms, edge computing is the fastest growing.

Gaining Immunity to Privilege Escalation

Privilege escalation is the most common type of first-step cyber attacks.

Skip to content