Blog

HUB announcements and global media coverage

The Next Cyberattack Is Here! – Part 2

See our top 10 recommendations for preparing for a cyber incident.

The Next Cyberattack Is Here!

What can we do that we realize we can't completely avoid cyberattacks?

Unlocking the Potential of AI for Healthcare Through Confidential Computing

Cybersecurity in the health sector is literally a matter of life and death.

Confidential Computing: Secure the Battlefield

Cyber Warfare has become the fifth dimension for overt and covert combat systems.

4 Key Changes in the New ISO 27002:2022 Revision

ISO 27002:2022 is out! It’s official – cybersecurity is the name of the game.

Telcos and IoT

The Internet of Things is revolutionizing many aspects of business.

Digital Twins for Confidential Computing

Several types of digital twins and different levels of protection.

4IR: The Invisible Revolution – Part Four

Dangers of 4IR, securing 4IR and different approaches.