Category: Computing

  • Computer Security: Password evolutions

    Computer Security: Password evolutions

    Following the successful deployment of two-factor authentication (2FA) to more than 42 000 CERN accounts, one final step to ensure full compliance with the recommendations of the 2023 audit on CERN’s cybersecurity remains

    Explore →

  • When failure is good news

    When failure is good news

    The software managing CERN’s compute workload has handled a massive stress test, far beyond normal operating conditions, designed to simulate the needs of the future

    Explore →

  • Computer Security: 20 years of securing controls (or trying to): mitigations

    Computer Security: 20 years of securing controls (or trying to): mitigations

    We’ve seen in the past two Bulletins that control system cybersecurity is the black sheep of IT, a hard-to-change tanker’s course. Still, with significant daily damage of 250 000 USD for ALMA, the costs of falling to a cyberattack can no longer be ignored

    Explore →

  • Computer Security: 20 years of securing controls (or trying to): black swans and convergence

    Computer Security: 20 years of securing controls (or trying to): black swans and convergence

    While eagerly expected by experts, the first dominant incident on control systems reported by the media was the Stuxnet attack of 2010 against the Iranian nuclear programme allegedly conducted by some secret services

    Explore →

  • Computer Security: 20 years of securing controls (or trying to): nothing has changed?

    Computer Security: 20 years of securing controls (or trying to): nothing has changed?

    20 years ago, control systems used to be stand-alone systems, usually decoupled from the larger enterprise networks, using their own network cabling infrastructures and programming languages dedicated to control systems. But no more…

    Explore →

  • Computer Security: CERN, beautified

    Computer Security: CERN, beautified

    The Computer Security Office is planning to improve the security posture of CERN’s web presence, making it a bit more beautiful than before

    Explore →

  • White Rabbit meets quantum entanglement

    White Rabbit meets quantum entanglement

    The CERN-born open-source timing technology is being tested for use in quantum networks and secure quantum communication

    Explore →

  • Computer Security: “ClickFix”, a nasty copy & paste

    Computer Security: “ClickFix”, a nasty copy & paste

    “ClickFixing”, or the art of luring you into executing a very simple string of copy/paste-like tasks to install malware on your computer

    Explore →

  • Computer Security: Block ads, stay clean

    Computer Security: Block ads, stay clean

    The main ways to get your computer infected these days are clicking on the wrong link, accessing the wrong website and/or installing the wrong software…

    Explore →

  • CERN donates computing equipment to Egypt

    CERN donates computing equipment to Egypt

    The donation was celebrated during a visit to CERN by the Egyptian Minister of Higher Education and Scientific Research on 30 July

    Explore →