If we want to protect CERN and to have a decent level of security, we cannot avoid deploying a certain set of computer security measures… and they all come with inconveniences
If you’re interested in what’s going on at CERN, in professional projects and plans, or in private problems and parties, hanging out at one of CERN’s printers is a very effective approach...
A warm welcome to the summer-student class of 2024! In order to make your digital life as comfortable as possible, here are a few things you need to know
This spring has seen two fraudulent transactions on the CERN Marketplace. In both cases, the fraudsters were advertising vacant apartments that they didn’t own
Hand-in-hand with the Computer Security team, you, as an excellent software developer and experienced programmer, have followed the right courses to put in place a secure software programming and code development life-cycle...
The Computer Security team decided to engage with ethical hackers and launched a three (and a half) staged approach towards improving the security of CERN’s Internet presence and beyond
There are many different ways to unlock your smartphone: swiping patterns, PIN numbers, passwords, biometric fingerprints or face recognition. Some are more secure, some less so
With ongoing vulnerability scans of CERN’s internet presence, the Computer Security team’s plans to perform penetration testing against selected targets visible to the internet
Bravo to all those who participated in the Bull**** Bingo and sent us their solution. Some people were wondering why their responses were not correct… Good point, so let’s walk through that Bingo
These paradigms “KISS ─ keep it simple, stupid” and “defence-in-depth” go hand in hand once we all jointly pick the right two of “cheap, convenient, secure”