Workflow
Confidential Computing
icon
Search documents
X @Messari
Messari· 2025-09-26 17:09
Technology & Innovation - Trusted Execution Environments (TEEs) are evolving from crypto infrastructure to AI, establishing a hardware-secured trust layer [1] - This trust layer is crucial for sensitive data handling, private model utilization, and verifiable execution in AI [1] - The convergence of confidential computing and blockchains can foster enterprise trust in AI [1] Industry Focus - TEEs are expanding beyond blockchains to become a fundamental trust layer for AI applications [1] - The integration of TEEs and blockchains addresses critical trust gaps in the AI landscape [1]
HUB CYSEC(HUBCZ) - Prospectus
2025-09-02 23:43
As filed with the Securities and Exchange Commission on September 2, 2025. Registration No. 333- UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM F-1 REGISTRATION STATEMENT UNDER THE SECURITIES ACT OF 1933 HUB CYBER SECURITY LTD. (Exact name of registrant as specified in its charter) State of Israel 3576 None (I.R.S. Employer Identification No.) (Primary Standard Industrial Classification Code Number) HUB Cyber Security Ltd. 2 Kaplan Street Tel Aviv, Israel 6473403 +972 (3) 791-3 ...
HUB Cyber Security .(HUBC) - Prospectus
2025-09-02 23:43
As filed with the Securities and Exchange Commission on September 2, 2025. Registration No. 333- UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM F-1 REGISTRATION STATEMENT UNDER THE SECURITIES ACT OF 1933 HUB CYBER SECURITY LTD. (Exact name of registrant as specified in its charter) State of Israel 3576 None (I.R.S. Employer Identification No.) (Primary Standard Industrial Classification Code Number) HUB Cyber Security Ltd. 2 Kaplan Street Tel Aviv, Israel 6473403 +972 (3) 791-3 ...
Infrastructure Consolidation and Confidential Computing on AMD
AMD· 2025-08-20 18:21
Product & Technology - AMD EPYC™ processors enable infrastructure modernization and confidential computing for public sector organizations [1] - AMD provides secure architecture innovations for mission-critical workloads [1] Target Audience & Industry - Focuses on public sector organizations [1] Marketing & Legal - ©2025 Advanced Micro Devices, Inc [1] - AMD, the AMD Arrow Logo, are trademarks of Advanced Micro Devices, Inc in the United States and other jurisdictions [1]
X @CoinMarketCap
CoinMarketCap· 2025-08-07 10:30
Partnerships & Collaborations - CoinMarketCap (CMC) welcomes Super Protocol to its Web3 Accelerator program [1] - CMC Labs and Super Protocol are partnering to unlock the next chapter in Confidential AI for Web3 [2] - The partnership aims to create new tools at the intersection of AI, DeFi, and confidential computing [2] - These tools will be distributed through CMC's channels and community [2] Technology & Innovation - Super Protocol is building a new kind of AI cloud and marketplace that is confidential, verifiable, and unstoppable [1] - Super Protocol's Confidential Computing for AI Agents and Apps was spotlighted by NVIDIA [1] - The goal is to make privacy and verifiability a default for the next wave of Web3 builders [2]
The Unofficial Guide to Apple’s Private Cloud Compute - Jonathan Mortensen, CONFSEC
AI Engineer· 2025-07-30 17:00
Technology Innovation - Apple introduced "Private Cloud Compute" in October 2024, a new private AI technology for millions of devices [1] - Private Cloud Compute offers local device-level privacy and security on an untrusted remote server [1] - The technology enables developers to run sensitive, multi-tenant workloads with cryptographically-provable privacy guarantees at scale and at reasonable cost [1] Industry Impact - Private Cloud Compute represents a paradigm shift in confidential computing, making it mainstream [1] - The technology can be leveraged for data and AI applications where privacy and security are paramount [1] Key Personnel - Jonathan Mortensen, CEO of a stealth AI startup and Founder Fellow at South Park Commons, previously founded bit.io, a multi-cloud serverless PostgreSQL platform acquired by Databricks [1] - Prior to bit.io, Jonathan Mortensen led data science and engineering teams at BlueVoyant, designing high-volume data pipelines processing 50 million events per second [1]
Nasdaq Confirms Full Compliance of HUB Cyber Security with Nasdaq's Listing Standards
GlobeNewswire News Room· 2025-06-12 12:19
Core Viewpoint - HUB Cyber Security Ltd. has achieved full compliance with Nasdaq listing requirements, marking a significant milestone following strategic restructuring and improved financial execution [1][2]. Company Overview - HUB Cyber Security Ltd. is a global leader in confidential computing and advanced secured data fabric technology, established in 2017 by veterans of the Israeli Defense Forces [5]. - The company specializes in secured data infrastructure, providing solutions for secure AI operations, compliance automation, and digital asset protection for financial institutions and governments [5]. Compliance and Financial Performance - Nasdaq confirmed that HUB meets the minimum bid price and market value of listed securities thresholds, indicating successful compliance with Listing Rules [2]. - The company has undergone a period of strategic restructuring, which has led to improved financial execution and strengthened corporate governance [2]. Business Strategy and Growth - HUB has been executing a focused commercial expansion strategy, significantly growing its contracted revenue base and accelerating deployments across banking, government, and digital asset sectors [3]. - The company continues to sign new multi-year agreements with leading financial institutions and sovereign entities, expanding its presence in North America and Europe [4]. Product Development - HUB has introduced new AI-powered and quantum-resilient infrastructure solutions in response to rising client demand for secure and compliant solutions [3]. - The Secured Data Fabric platform, developed in partnership with BlackSwan Technologies, is emerging as a leader in highly secure data management and unification [5].
Nasdaq Confirms Full Compliance of HUB Cyber Security with Nasdaq’s Listing Standards
Globenewswire· 2025-06-12 12:19
Core Viewpoint - HUB Cyber Security Ltd. has achieved full compliance with Nasdaq listing requirements, marking a significant milestone following strategic restructuring and improved financial execution [1][2]. Company Overview - HUB Cyber Security Ltd. is a global leader in confidential computing and advanced secured data fabric technology, established in 2017 by veterans of the Israeli Defense Forces [5]. - The company specializes in secured data infrastructure, providing solutions for financial institutions, governments, and regulated enterprises, and operates in over 30 countries [5]. Compliance and Financial Performance - Nasdaq confirmed that HUB meets the minimum bid price and market value of listed securities thresholds, indicating successful compliance with Listing Rules [2]. - The company has undergone strategic restructuring, which has led to improved financial execution and strengthened corporate governance [2]. Business Strategy and Growth - HUB has been executing a focused commercial expansion strategy, significantly growing its contracted revenue base and accelerating deployments in banking, government, and digital asset sectors [3]. - The introduction of new AI-powered and quantum-resilient infrastructure solutions has been a response to rising client demand for secure and compliant solutions [3]. Market Position and Agreements - HUB continues to sign multi-year agreements with leading financial institutions and sovereign entities, expanding its presence in North America and Europe [4]. - The company is positioned as a critical infrastructure provider to security-sensitive organizations, with momentum building across public and private sector channels [4].
Arqit Quantum (ARQQ) - 2025 H1 - Earnings Call Transcript
2025-05-22 16:02
Financial Data and Key Metrics Changes - For the first half of fiscal year 2025, the company generated $67,000 in revenue, down from $119,000 in the same period of 2024, primarily due to customer delays in contract activities [29][22] - The operating loss for the period was $17,800,000 compared to a loss of $16,600,000 in the first half of fiscal year 2024, reflecting lower revenue and increased administrative expenses [32][34] - As of March 31, 2025, the company had cash and cash equivalents of $24,800,000 [34] Business Line Data and Key Metrics Changes - Revenue from the ARKit SKA platform as a service and ARKit Network Secure products totaled $52,400, with professional services and maintenance revenue at $14,500 for the period [30] - The company is transitioning from primarily enterprise sales to sales through channel partners, which affects revenue recognition timing [29] Market Data and Key Metrics Changes - The market for quantum-safe encryption is growing, with increasing awareness of the need for upgraded cryptography solutions due to the threat posed by quantum computing [5][7] - Significant contracts have been signed in the telecom and defense sectors, indicating a positive trend in market engagement [14][23] Company Strategy and Development Direction - The company is focused on delivering its technology to large enterprises and government customers, with a shift towards a subscription licensing model to align interests with customers [10][11] - Collaborations with major technology partners, such as Intel, are aimed at developing applications for confidential computing and enhancing product offerings [19][20] Management's Comments on Operating Environment and Future Outlook - Management expressed optimism about the growing market awareness of quantum-safe encryption and the company's positioning to meet this demand [35][36] - The company anticipates that sales cycles will compress as it builds on existing customer relationships and leverages its technology in complex environments [48] Other Important Information - The company has made significant progress in product development and market penetration, with a disciplined approach to cost control [4][21] - The company is actively recruiting sales personnel with expertise in targeted verticals to capitalize on market opportunities [45] Q&A Session Summary Question: Are the deals that closed at or near the end of the fiscal period currently generating revenue? - The contract with the tier one network operator is a three-year contract, and revenue is expected to grow as end users are signed up [39] Question: What types of people is the company hiring for the sales team? - The company is hiring individuals with deep industry knowledge in telecom and defense sectors to enhance sales efforts [45] Question: Do you expect any increase in operating expenses to support new contracts? - The company does not foresee significant growth in operating costs in the near term, maintaining a focus on customer fulfillment with current staffing levels [54]
HUB Cyber Security Expands Cybersecurity Practice with Strategic Client Wins Across Regulated Sectors
Globenewswire· 2025-05-12 11:40
Core Viewpoint - HUB Cyber Security Ltd. has achieved significant customer wins in high-risk, regulated industries, indicating strong demand for its cybersecurity solutions and services [1][2][3] Group 1: Customer Engagements and Financials - The new customer engagements, signed in Q1 2025, are collectively valued at over $1.5 million, highlighting HUB's growth in providing secure infrastructure [2] - Over 60% of HUB's annual revenue in FY2024 was derived from recurring contracts, primarily in financial services and critical infrastructure [3] Group 2: Strategic Focus and Market Position - The CEO of HUB emphasized the company's strategy of building long-term relationships in industries that require resilience, security, and compliance [3] - HUB is actively deploying its secured data infrastructure and confidential computing capabilities across North America and Europe, enhancing its position as a trusted cybersecurity partner [4] Group 3: Company Background - HUB Cyber Security Ltd. was established in 2017 by veterans of the Israeli Defense Forces and specializes in unique cybersecurity solutions for sensitive information [5] - The company's core product, the Secured Data Fabric (SDF), is designed to meet the needs of institutions requiring zero-trust environments and AI-driven compliance [3][5]