While performance benchmarks are often application or industry specific they can also provide useful insights that are widely applicable. Risk analytics applications used in financial services industries have performance characteristics similar to many technical computing applications. These applications are large, compute intensive, and take full advantage of parallel processing and compute accelerators.
STAC®, the Securities Technology Analysis Center LLC (www.STACresearch.com), provides technology research and testing tools including
Continue reading “Red Hat and Partners Deliver New Performance Records on Prominent Risk Analytics Benchmark”
Red Hat Product Security was made aware of a vulnerability affecting the Linux kernel’s implementation of the Bluetooth L2CAP protocol. The vulnerability was named BlueBorne and was assigned an ID – CVE-2017-1000251.
A vulnerable system would need to have Bluetooth (hardware + service) enabled and an attacking device would need to be within
Continue reading “BlueBorne – An Analysis”
Most people don’t consider their average USB memory stick to be a security threat. In fact, in a social engineering experiment conducted in 2016 at the University of Illinois and detailed in this research paper, a group of researchers dropped 297 USB sticks outside in the parking lot, in the hallway, and classrooms. Of the 297 USB sticks dropped,
Continue reading “Built-in protection against USB security attacks with USBGuard”
Red Hat has sailed into December with prestigious industry recognition for helping customers modernize and simplify their IT infrastructure. Even if they’re not quite ready for the cloud today, we provide the elements of a stable and flexible foundation with security features for when they are. This week our commitment to customers at all stages of their cloud journey was recognized with two European IT awards.
Continue reading “The winning team for any kind of cloud”