At CERN, we probe the fundamental structure of particles that make up everything around us. We do so using the world's largest and most complex scientific instruments.
Know more
Who we are
Our Mission
Our Governance
Our Member States
Our History
Our People
What we do
Fundamental research
Contribute to society
Environmentally responsible research
Bring nations together
Inspire and educate
Fast facts and FAQs
Key Achievements
Key achievements submenu
The Higgs Boson
The W boson
The Z boson
The Large Hadron Collider
The Birth of the web
Antimatter
News
Accelerators
At CERN
Computing
Engineering
Experiments
Knowledge sharing
Physics
Events
CERN Community
News and announcements
Official communications
Scientists
Press Room
Press Room submenu
Media News
Resources
Contact
The research programme at CERN covers topics from kaons to cosmic rays, and from the Standard Model to supersymmetry
Dark matter
The early universe
The Higgs boson
The Standard Model
+ More
CERN's accelerators
The Antiproton Decelerator
High-Luminosity LHC
Accelerating: radiofrequency cavities
Steering and focusing: magnets and superconductivity
Circulating: ultra-high vacuum
Cooling: cryogenic systems
Powering: energy at CERN
The CERN Data Centre
The Worldwide LHC Computing Grid
CERN openlab
Open source for open science
The birth of the web
ALICE
ATLAS
CMS
LHCb
By Topic
By format
360 image
Annual report
Brochure
Bulletin
Courier
Image
Video
By audience
CERN community
Educators
General public
Industry
Media
Students
In the physical world, we apply many safety measures automatically and repeatedly. How come we are more relaxed in the virtual world?
The beginning of the year has been dominated by two security vulnerabilities, known as Meltdown and Spectre
CERN’s OpenStack service provides you with enormous computing and storage resources to achieve your professional goals
Software of high quality that is well programmed, with best-practice security principles in mind, is harder to exploit
If you also want to become a penetration tester and identify potential areas for improving CERN’s computer security sign up to the WhiteHat Challenge
In the real world, we have become accustomed to acting securely, but we struggle to keep our computers up to date such that basic digital protections
Now attackers have started increasing the pressure, and now comes the next level: “Doxware”
“Academic” and “freedom” do not imply “devoid of rules”
Your passwords deserve the same care and attention as your car and house keys, your credit cards or your Smartphone
Autumn conference season is fast approaching. Have you ever thought about how best to secure your laptop and smartphone while travelling?
Successful cyberattacks always start with the compromise of a PC
IoT devices cannot be expected to be secure