October 16, 2014 | Stuart Martin

On Wednesday, October 14th, a new vulnerability (CVE-2014-3566) was announced in the SSLv3 protocol.

October 16, 2014 | Vas Vasiliadis

We recently changed the policies that govern access to certain Globus features. These changes are informed by our experiences in offering paid subscriptions to researchers and resource providers over the past ~2 years. Here's what's changing:

September 25, 2014 | Stuart Martin

On Wednesday, September 24th, a new vulnerability (CVE-2014-6271) was announced in the widely used GNU Bourne Again shell and command language interpreter (aka Bash), which is the default shell for Red Hat Enterprise Linux, among others.

June 6, 2014 | Stuart Martin

On Thursday, June 5th, a new OpenSSL vulnerability (CCS Injection Vulnerability) was announced.  After its announcement, we reviewed the severity and impact to Globus services, partner services and users. Soon thereafter, we posted details in our support forum, with continuing updates as we learn more. Overall, our assessment for the severity of the impact for this issue is low. The forum post does include

May 27, 2014 | Laurel Wamsley

We are happy to announce that the Globus user of the month for May 2014 is Robert Edwards, a staff scientist in the Theory Group at Jefferson Lab, a Department of Energy Nuclear Physics experimental facility. 

Here he tells us about the work he’s doing, and how Globus helps him do it:

April 23, 2014 | Laurel Wamsley

GlobusWorld 2014 took place in Chicago last week and it was a great success, drawing more than 120 HPC computing experts and scientists to Argonne National Lab for the three-day event. Attendees participated in tutorials illuminating the full range of Globus capabilities, learned how different campuses are thriving with Provider Plans and Globus Plus, and heard about cutting-edge genomic research supported by Globus Genomics.

April 21, 2014 | Vas Vasiliadis

Two weeks after the discovery of the Heartbleed bug we’re still actively monitoring the situation and fixing systems that might be at risk. After updating software and certificates, we believe that our systems are no longer vulnerable to Heartbleed. We maintain a detailed list of the corrective actions we've taken in our support forum.

April 16, 2014 | For Immediate Release

Chicago, Illinois - April 16, 2014 - The explosion of data across disciplines has opened up vast new possibilities for scientific discovery. But many researchers do not yet have access to the advanced infrastructure needed to work with Big Data and realize its full potential.

April 8, 2014 | Vas Vasiliadis

By now, almost every system administrator on the planet is aware of the OpenSSL vulnerability (also known as the Heartbleed bug). Since its announcement we've been hard at work reviewing all Globus services and software components to figure out which of them, if any, are vulnerable.

April 7, 2014 | UC San Diego News

The San Diego Supercomputer Center (SDSC) at the University of California, San Diego, has implemented a new feature of the Globus software that will allow researchers using the Center’s computational and storage resources to easily and securely access and share large data sets with colleagues. SDSC is the first supercomputer center in the National Science Foundation’s XSEDE (eXtreme Science and Engineering Discovery Environment) program to offer the new and unique Globus sharing service.