Category: Computing

  • Computer Security: ThisIsAVeryGoodPassword

    Computer Security: ThisIsAVeryGoodPassword

    Let’s give up the complexity rules (letters, symbols, numbers) and go for long passwords, i.e. “passphrases”, instead. Long but easy to remember

    Explore →

  • Computer Security: The cost of compromise

    Computer Security: The cost of compromise

    Recently, the Computer Security Office reported on a cybersecurity incident at a remote Tier 2 site of the Worldwide LHC Computing Grid (WLCG)

    Explore →

  • Computer Security: Store your data right

    Computer Security: Store your data right

    The Legal Service, the Computer Security team and stakeholders from the FAP and IT departments have produced a Data Handling Policy (DHP) setting out how all CERN professional data must be handled

    Explore →

  • Computer Security: 2025 – Plugging holes

    Computer Security: 2025 – Plugging holes

    The Computer Security Office has been attempting to plug obvious holes in CERN’s computer security stance since well before the 2023 cybersecurity audit, and it will continue to do in 2025 and beyond

    Explore →

  • International Geneva celebrates the International Year of Quantum

    International Geneva celebrates the International Year of Quantum

    Hosted in the historical venue of the Geneva Conservatory of Music, the event brought quantum technologies on stage for the local and global community

    Explore →

  • Computer Security: When free+free becomes costly

    Computer Security: When free+free becomes costly

    Before using any cloud service, software or application, check its licence conditions…

    Explore →

  • Revised computer security rules

    Revised computer security rules — [This article was updated on 4 February 2025] At its second meeting, the Computer Security Board formally approved several Subsidiary Rules to the Use of CERN computing facilities (Operational Circular No. 5, OC5) related to Identities, Authentication & Authorisation (IAA). The approved rules (IAA2/3/4/6/7) are now documented on the website

    Explore →

  • Computer Security: Don’t let your data walk away

    Computer Security: Don’t let your data walk away

    Data confidentiality, while not paramount for CERN’s physics data, is still important when it comes to protecting sensitive contractual, financial, personal, radiation- and science-related documents and files…

    Explore →

  • Data Classification Policy

    Data Classification Policy — CERN has just released, for internal distribution only, the Data Classification Policy document, which establishes a framework for classifying professional data entrusted to or originating from the Organization. The objective of classification is to provide persons dealing with information with a concise indication of its level of security and access, thus

    Explore →

  • Document Management Systems – Guidelines

    Document Management Systems – Guidelines — Over the years, CERN’s workflows and activities have resulted in a variety of software solutions being used to manage, store and track digital records. Based on an analysis of the document management systems (DMSs) currently used at CERN, the recently published Document Management Systems document aims to provide users

    Explore →