News
News
Computer Security: The cost of compromise
Recently, the Computer Security Office reported on a cybersecurity incident at a remote Tier 2 site of the Worldwide LHC Computing Grid (WLCG)
Computer Security: Store your data right
The Legal Service, the Computer Security team and stakeholders from the FAP and IT departments have produced a Data Handling Policy (DHP) setting out how all CERN professional data must be handled
Computer Security: 2025 – Plugging holes
The Computer Security Office has been attempting to plug obvious holes in CERN’s computer security stance since well before the 2023 cybersecurity audit, and it will continue to do in 2025 and beyond
International Geneva celebrates the International Year of Quantum
Hosted in the historical venue of the Geneva Conservatory of Music, the event brought quantum technologies on stage for the local and global community
Computer Security: When free+free becomes costly
Before using any cloud service, software or application, check its licence conditions...
Computer Security: Don’t let your data walk away
Data confidentiality, while not paramount for CERN’s physics data, is still important when it comes to protecting sensitive contractual, financial, personal, radiation- and science-related documents and files...
Computer Security: Are you a team player?
Today, we stand on the shoulders of giants, of giant teams, of collaborations, and only jointly can we reach our (research) goals
Computer Security: A security balancing act
CERN must be protected against any kind of successful large-scale attack, while maintaining a balance between security, academic freedom and the use of accelerators and experiments
Computer Security: Free croissants for everyone
We strongly encourage everyone to lock their computer with a password-protected screen lock when leaving the device unattended
Computer Security: Security Rules revised
All owners of computing resources connected to or provided to them by CERN’s computing facilities are ultimately responsible for the compliance of their actions and their resources with these Rules