Tag Archive for: Special

HUB Cyber Security and Mount Rainier Announce Registration Statement Effectiveness and Special Meeting Date to Approve Business Combination


Special Meeting Scheduled for December 30, 2022 with Expected Closing in January 2023 followed by Listing on Nasdaq at an estimated enterprise value of approximately $1.28 billion

TEL AVIV, Israel, Dec. 9, 2022 /PRNewswire/ — HUB Cyber Security (Israel) Limited (TASE: HUB), a developer of Confidential Computing cybersecurity solutions and services (“HUB” or the “Company“), announced that its registration statement on Form F-4 (the “Registration Statement“), in connection with its previously announced business combination (the “Business Combination“) with Mount Rainier Acquisition Corp. (“RNER“), has been declared effective by the U.S. Securities and Exchange Commission (the “SEC“) as of December 8, 2022.

RNER will hold a Special Meeting of Stockholders at 10:00 a.m. Eastern time on December 30, 2022, to approve the previously announced business combination with HUB. Stockholders of record at the close of business on November 18, 2022, will be entitled to receive notice of and to vote at the Special Meeting. The meeting will be held virtually over the internet by means of a live audio webcast available at: https://web.lumiagm.com/297859227 using the password “mtrainier2022.” 

To register and receive access to the virtual meeting, registered stockholders and beneficial stockholders (those holding shares through a stock brokerage account or by a bank or other holder of record) will need to follow the instructions applicable to them provided in the proxy statement/prospectus included in the Registration Statement.

The proxy statement/prospectus is being mailed to the Company’s stockholders of record as of the close of business on the Record Date. Notice of the Special Meeting was mailed on or about December 9, 2022 to stockholders of record as of the Record Date.

As previously announced, the transaction represents a combined company pro forma enterprise value of approximately $1.28 billion. The transaction is expected to provide up to $225 million in gross proceeds comprised of Mount Rainier’s approximately $175 million of cash held in trust, assuming no redemptions by RNER’s stockholders, and a $50 million fully committed ordinary share PIPE at $10.00 per share, led by A-Labs…

Source…

Special Report: Data Security | Digital Health


With technology changing the way health related information is stored, the importance of having good data security has never been more important. Andrea Downey investigates.

As technology in healthcare settings becomes more prominent, so too has the need for robust data security. As the way patient data is used and stored has moved away from more analogue means such as paper filing systems, the approach to data security must also change.

For Johan Åtting, chief information security officer (CISO) at Sectra, security simply cannot be an afterthought.

“A key concept that we use at Sectra is ‘security by design and by default’, security cannot be effectively added to a product or system afterwards, it has to be within focus from the design of a product throughout the building, testing and deployment of the product,’ he says.

“At Sectra, security architects are involved from the very start of the design of a product, and every development team has a security champion that ensures that security is considered in every aspect of development and testing.”

Åtting goes on to explain the importance of merging clinical and technological ideas – one cannot have a securely designed piece of health tech if there has been no clinical input. Put simply, it would render the technology moot.

“Security has to be balanced with clinical effectiveness and usability. If we implement security in a sub-optimal way it could hinder the usability or the clinical effectiveness of the product,” he explains.

Managing and protecting data

Darren James, technical lead at security software company Specops, offers a similar outlook. He stresses it is “imperative” for NHS trusts to properly manage and protect patient data.

“We’ve seen more and more attacks in recent years using the supply chain to gain access to a target organisations data. Healthcare, and in particular an organisation the size of the NHS, is particularly vulnerable due to the number of users, endpoints and systems that are currently in use,” he says.

“Therefore, it is imperative that NHS trusts make the right choice when selecting solutions that have access to patient and staff data and look in depth where and how that data…

Source…

Mike Wimmer: The Real Tony Stark Working For Special Operations?


In an age of rapidly changing technology, where tech becomes obsolete almost as soon as it hits the shelves, staying on top of the wave is the only way to keep from being rolled over. Mike Wimmer is doing a good job of riding that wave.

Mike Wimmer is an American entrepreneur. He has some exciting ideas on artificial intelligence the US government is interested in. His achievements include being Valedictorian at his high school graduation, starting two tech companies, having membership in Mensa, Congressional briefings, and being coined by the United States Special Operations Command’s (USSOCOM) directorate of science and technology. Did I mention he’s 13 years old?

Mike Wimmer, Entrepreneur. (Photo from nexterainnovations.com)

Real (Young) Genius

About the same age you and I were learning not to finger paint with the contents of our diapers, Mike was learning trigonometry. While we were playing with Hot Wheels cars, Mike was too, developing computer algorithms to recognize his Hot Wheels. At the same age, I was standing against the wall, too nervous to ask a girl to dance at Homecoming; Mike was signing contracts with USSOCOM. Where did I go wrong?

Oh, wait, I didn’t. I spent long years reaching this point, where I could tell you about Mike Wimmer, the cool things he is doing, and how expertise like his is how the US military is stepping into the new millennium. We each have our roles in this life. Mike’s role is different than mine. Or yours. Or most everyone else.

Global Shift to Technological Warfare

In recent articles, the SOFREP team has brought you more information about the future of artificial intelligence in warfare. Technological leaps in global warfare have brought China to the top of the news cycle. Russian hackers appear to have access to nearly every network on the planet (and beyond). Every military branch and office within the US government has a cyber operations division. Globally connected systems are here to stay.

Real-time cyber attacks, including information on the attack’s origin, type, and target, as well as the attacker’s IP address, geographic location, and ports being utilized, are displayed on the Norse attack map on the 275th Cyberspace…

Source…

Google is making a special Android security team to keep sensitive app safe – Times of India

  1. Google is making a special Android security team to keep sensitive app safe  Times of India
  2. New Google security program makes the best Android phones way more secure  Android Central
  3. The Morning After: New Google initiative keeps tabs on Android security flaws  Engadget
  4. Google will now disclose security issues in third-party devices  TechRadar
  5. Google Will Alert Android Users of Security Bugs on Non-Pixel Phones  Softpedia News
  6. View Full Coverage on read more

“android security news” – read more