HUB Cyber Security

Find the latest for HUB Cyber Security company news

Rethinking vendor risk management in the age of AI and automation

Without continuous oversight, security gaps can go undetected until it's too late. Addressing these shortcomings requires a shift from manual, reactive processes to automation-powered security operations, where real-time monitoring and AI-driven analytics provide the agility needed to stay ahead of evolving threats.

Cybersecurity 7month
AI-Powered Cybersecurity: Balancing Automation, Real-Time Detection and Strategic Oversight

By combining AI's advanced capabilities with strategic oversight and robust security measures, organizations can protect themselves against increasingly sophisticated cyber threats.

Cybersecurity 7month
5 Pillars For Data Cybersecurity In The Evolving Digital Landscape

Five cybersecurity pillars can improve data protection. They include risk management, using AI, encryption, optimal cloud hybrid environments, and incident response.

Cybersecurity 8month
CyberArk Software (CYBR) and SentinelOne Partner on AI Security

We recently published a list of Top 11 AI News and Ratings You Should Take a Look At. In this article, we are going to take a look at where CyberArk Software Ltd. (NASDAQ:CYBR) stands against other top AI news and ratings you should take a look at.

Cybersecurity 8month
ESG Watch: Companies 'complacent about cybercrime', despite rise in risk from AI

In the World Economic Forum's latest Global Risks Report three of the top 10 risks are technological: misinformation and disinformation; adverse outcomes of AI technologies; and cyber espionage and warfare.

Cybersecurity 8month
Ivy Tech's new partnership to boost cybersecurity program

Ivy Tech Community College recently announced a new partnership with Israeli-based technology firm CyberProAI to help students in its cybersecurity program.

Cybersecurity 8month
Securing Cyberspace: How machine learning and deep learning drive robust security

Malicious URLs are among the most common vectors for cyberattacks, enabling phishing, malware distribution, and data theft. Traditional URL filtering methods often struggle to keep up with the evolving tactics of cybercriminals,

Cybersecurity 9month
AI security: establishing the first and last layer of defense

With rapid AI adoption, businesses need new methods to protect their data. Network segmentation is the key to establishing a first and last line of defense.

Cybersecurity 9month