In this episode, the Radio Free HPC team looks at the recent hack of U.S. government employee data. Hackers stole personnel data and Social Security numbers for every federal employee, including military records and veterans’ status information, address, birth date, job and pay history, health insurance, life insurance and pension information; and age, gender, and race data.
While Lenovo now scrambles into Damage Control mode in the wake of the Superfish scandal, the question for our readers is: how will this affect Lenovo’s ability to sell to the U.S. Federal supercomputing market?
As you’ve increasingly seen in news headlines, secure access to shared data is not only an issue for Federal and local government agencies and the Intelligence Community – it has also become an issue for business enterprises needing to protect their intellectual property and other sensitive business data while engaging on a global scale with their partners and contractors.
This article series is the first to explore the Seagate ClusterStor™ Secure Data Appliance, which is designed to address government and business enterprise need for collaborative and secure information sharing within a Multilevel Security (MLS) framework at Big Data and HPC Scale. Compared to prior methods, this provides vast cost savings in reduced capital equipment and networks as well as reduced operational complexity, floor space, weight, power, and cooling while satisfying today’s requirements for performance, collaborative secure data sharing, and availability.
In this episode, the Radio Free HPC team looks at Network Security in light of the recent series of breaches at places like Sony, Home Depot, and Target. Our special guest this week is Security Expert Linda Millis, who has a day job as Senior VP of Sol-Pass.
Christopher Atwood from HPCMP presented this talk at the Stanford HPC & Exascale Conference. “High Performance Computing Modernization Program (HPCMP) stakeholders require securable access to computational resources from clients with stringent administration restrictions. Hence, for example a user prevented from installing a Kerberos kit on a workstation is unable to access supercomputers. A solution based on WebGL ha resulted in a highly responsive user interface.”
“Red Hat Enterprise Linux features tight integration with SELinux, which enables the platform’s native configurations to offer Role-Based Access Control (RBAC), data labeling, and continuous monitoring of security controls.”
This week the MetaFlows startup announced that its MetaFlows Security System (MSS) is being used to secure the network at the SC13 conference.