What’s new at CIQ?
We’re a team of scientists, Linux geeks, technologists, pilots, designers and more with a mission to make infrastructure something you never have to think about.

Reactive vs. proactive security: why your Linux infrastructure needs both
The reactive security model Most enterprise security operates on a straightforward cycle: detect threats, respond to incidents, patch vulnerabilities, repeat. This model has served organizations well…

CVE management: automate discovery to remediation
When your security team asks, "Are we vulnerable to CVE-2026-XXXX?" the answer needs to come in minutes, not hours. With over 100 new CVEs published daily—and some days exceeding 1,000—manual…

Why security automation belongs in your risk management strategy
Over 100 new CVEs are published daily. Attackers begin scanning for unpatched systems within hours of disclosure. Your quarterly patching cycle leaves you exposed to thousands of vulnerabilities…

How to run interactive HPC workloads alongside batch jobs in a single workflow
Fuzzball Service Endpoints bring interactive computing to HPC workflow orchestration—run Jupyter notebooks, visualize simulations in real time, and coordinate services as part of your computational…

LKRG 1.0: Runtime defense for Linux kernel
LKRG is a kernel module that performs runtime integrity checking of the Linux kernel and detection of security vulnerability exploits against the kernel. For process credentials, LKRG attempts to…
Weekly newsletter
No spam. Just the latest releases and tips, interesting articles, and exclusive interviews in your inbox every week.
Read about our privacy policy.

AI workflow orchestration: why separate platforms fail
Why the gap between training and inference exists—and what unified workflows actually look like. Every deployment pipeline you've built to bridge training and inference is technical debt you didn't…

Linux kernel CVEs 2025: what security leaders need to know to prepare for 2026
The first 16 days of 2025 delivered 134 new Linux kernel CVEs (Common Vulnerabilities and Exposures—the standard system for tracking security flaws).1 By October, CISA had added seven kernel…

Congratulations to NVIDIA and SchedMD: A new chapter for Slurm and the HPC community
Yesterday's announcement that NVIDIA has acquired SchedMD marks a significant milestone for the HPC and AI communities. On behalf of everyone at CIQ, I want to extend our congratulations to both…

Fuzzball + Slurm/PBS: Container orchestration meets traditional HPC schedulers
At SC25 in St. Louis, I had the opportunity to showcase one of the most significant new additions to Fuzzball's capabilities: native integration with PBS Professional and Slurm workload managers. This…

KubeCon Wrap Up
Last week, CIQ participated in KubeCon + CloudNativeCon North America 2025 in Atlanta, Georgia. CIQ's very own Chris Short hosted a talk during the event, participated in the CNCF Maintainers Summit…

Compliance Automation with Ascender Pro
A Q&A with Jimmy Conner, Principal Customer Advocate at CIQ Compliance doesn’t have to be painful. In this Q&A, we explore how Ascender Pro transforms compliance from a time-consuming burden into an…

Why Fedora EPEL statistics might be the best indicator of Enterprise Linux adoption
It’s very difficult to understand which Enterprise Linux distributions are most popular because nearly every organization is concerned about security and privacy. In this context, admins typically…