Patriot Blog

How to successfully secure a HPC system

In a previous post, we talked about the inherent differences and security risks between a High Performance Computing (HPC) system (computer clusters) and a traditional enterprise network. In order to secure a cluster it must be treated as a single unit and... Read More

Google Wallet: Smartphone mobile commerce

Well the future is finally here. With your smartphone, you can board airplanes, order a latte at Starbucks, watch 3D movies and now dispense a Coke from a vending machine. Google Wallet is a mobile application that aims to “turn your phone... Read More

Managing Federated Identities in the Cloud

I was visiting the Cloud Security Alliance (CSA) website recently, during one of my downtimes. And they had a new update to their “Security Guidance for Critical Areas of Focus in Cloud Computing V2.1.” I was drawn to the section on federated... Read More