Research Topic
High Performance Computing
Survey Report - Security Practices in HPC & HPC Cloud
High Performance ComputingInternet of ThingsQuantum-Safe SecurityBlockchain/Distributed LedgerArtificial IntelligenceIndustrial Control Systems
![](/assets/logos/circle-logo-icon-0363c38a37c65fa263a15e331b843b19d99db7de683947de1fee8f5d1ca9965c.png)
Discuss this topic in Circle
View discussion community![](/assets/research/topics/working-group-blue-circle-ec5fa32d3f4da2c65e251b426f82221fd5d948f4e817f90ba5651d7528fc6653.png)
Participate
CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.
Survey Report - Security Practices in HPC & HPC Cloud
Gain insights into the level and type of cyber and cloud security adopted by High Performance Computing (HPC) / HPC Cloud infrastructure to protect their infrastructure and workloads. This report highlights the perceived level of security, perception of security vs performance, drivers and impediments to cloud-enablement and improving security postures, and security practices that could be adopted in HPC / HPC Cloud environments.
Webinars
![Whitepaper: Practical Preparations for the Post-Quantum World](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTE2MywicHVyIjoiYmxvYl9pZCJ9fQ==--0e8bf9726c888a78a830eee855804da485adfd02/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMjMweDE4NF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ae668ec85fc8c9fcfec4a6acf011dcde1375ca3a/8.png)
![Standardize Identity Security: From On-Prem to Multi-Cloud](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTM2OCwicHVyIjoiYmxvYl9pZCJ9fQ==--6cbfe5201499e3690b1d50cff08373188b31c05a/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMjMweDE4NF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ae668ec85fc8c9fcfec4a6acf011dcde1375ca3a/CyberArk-Web-Thumbnail.png)
![Introducing our latest AI/ML open source project: LotL Classifier](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTU0NiwicHVyIjoiYmxvYl9pZCJ9fQ==--2cfb403bcac8eb00e40de394b7c2f8fe5c141de8/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMjMweDE4NF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ae668ec85fc8c9fcfec4a6acf011dcde1375ca3a/adobe2.png)
![Corda Enterprise 4.8 - Architecture Security Report and Security Controls Checklist](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTU3MCwicHVyIjoiYmxvYl9pZCJ9fQ==--0ea1d5d3ca59bd554b1b66d07f669872cc4de49d/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMjMweDE4NF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ae668ec85fc8c9fcfec4a6acf011dcde1375ca3a/corda.png)