L'équipe de la sécurité informatique
Welcome to CERN! For the next couple of weeks, you will be able to breathe in the free academic world of CERN
Before you embark on your future journey, take care of your digital legacy at CERN
Why "free" does not necessarily mean "free of charge" or, in the CERN context, why "free" software should not be used for professional or educational purposes
Like any other organisation, institute or enterprise, CERN is under permanent attack by evildoers
Help keep them secure. Discuss “security” with them. Tell them how to protect their digital life, their documents and data, their photos and videos
When using CERN resources, mining for professional purposes lacks any reasonable professional justification
Protect CERN, protect yourself! Using applications without a valid licence will lead to repercussions
Following up on some questions we received concerning our last Bulletin article, let us expand on the easiest way to lose your CERN password…
Money has always been a catalyst for greed and malice. Blackmail is one way to extort money from the innocent and has existed since ancient times
What do some webcams, cameras, video-conferencing cameras, control devices and Internet-of-Things devices connected to CERN networks have in common?
One major source of revenue on the Internet is advertisements. Interestingly, not only honest companies have embarked on online advertising...
The CERN Computing Rules govern the usage of CERN’s computing facilities, CERN’s wired and wireless networks including all devices connected to them