Author: Computer Security Office
-
Computer Security: 20 years of securing controls (or trying to): black swans and convergence
While eagerly expected by experts, the first dominant incident on control systems reported by the media was the Stuxnet attack of 2010 against the Iranian nuclear programme allegedly conducted by some secret services
-
Computer Security: 20 years of securing controls (or trying to): nothing has changed?
20 years ago, control systems used to be stand-alone systems, usually decoupled from the larger enterprise networks, using their own network cabling infrastructures and programming languages dedicated to control systems. But no more…
-
Computer Security: CERN, beautified
The Computer Security Office is planning to improve the security posture of CERN’s web presence, making it a bit more beautiful than before
-
Computer Security: “ClickFix”, a nasty copy & paste
“ClickFixing”, or the art of luring you into executing a very simple string of copy/paste-like tasks to install malware on your computer
-
Computer Security: Block ads, stay clean
The main ways to get your computer infected these days are clicking on the wrong link, accessing the wrong website and/or installing the wrong software…
-
Computer Security: easily applied
To make your life easier, the Computer Security Office has compiled four shortlists of “Security Principles”
-
Computer Security: Spam protection for phone calls
Unsolicited marketing and fraudulent calls are unfortunately very common nowadays. Although total protection is impossible, the CERN Telephony Service has implemented several mechanisms to reduce such annoying calls to all CERN telephone numbers
-
Computer Security: Internet of Damn Insecure Stupid Things
Here are some examples of the Internet of Damn Insecure Stupid Things that were deployed (or intended to be) at CERN. Be prepared to shake your head
-
Computer Security: TN v3.0
The worlds of IT and control systems have changed drastically thanks to virtualisation, containers, big data, machine learning, artificial intelligence, large language models… CERN needs to evolve towards Technical Network v3.0
-
Computer Security: 5 ways to remotely connect to CERN
With the roll-out of 2-factor authentication for the CERN Single Sign-On now concluded, the next step required by the 2023 CERN cybersecurity audit is to streamline all methods for remotely connecting to CERN


