Author: Computer Security Office
-
Computer Security: Allô? International response here
International collaboration and incident response is key. Because an incident in the Antipodes might directly affect the IT services at CERN. And has done so
-
Computer Security: SecDevOps tips
It should be common knowledge among software developers that writing software with as few weaknesses, vulnerabilities and flaws as possible is the most cost-efficient solution
-
Computer Security: ThisIsAVeryGoodPassword
Let’s give up the complexity rules (letters, symbols, numbers) and go for long passwords, i.e. “passphrases”, instead. Long but easy to remember
-
Computer Security: The cost of compromise
Recently, the Computer Security Office reported on a cybersecurity incident at a remote Tier 2 site of the Worldwide LHC Computing Grid (WLCG)
-
Computer Security: Store your data right
The Legal Service, the Computer Security team and stakeholders from the FAP and IT departments have produced a Data Handling Policy (DHP) setting out how all CERN professional data must be handled
-
Computer Security: 2025 – Plugging holes
The Computer Security Office has been attempting to plug obvious holes in CERN’s computer security stance since well before the 2023 cybersecurity audit, and it will continue to do in 2025 and beyond
-
Computer Security: When free+free becomes costly
Before using any cloud service, software or application, check its licence conditions…
-
Computer Security: Don’t let your data walk away
Data confidentiality, while not paramount for CERN’s physics data, is still important when it comes to protecting sensitive contractual, financial, personal, radiation- and science-related documents and files…
-
Computer Security: Are you a team player?
Today, we stand on the shoulders of giants, of giant teams, of collaborations, and only jointly can we reach our (research) goals
-
Computer Security: A security balancing act
CERN must be protected against any kind of successful large-scale attack, while maintaining a balance between security, academic freedom and the use of accelerators and experiments

