Tag: Computer Security

  • Computer Security: 20 years of securing controls (or trying to): black swans and convergence

    Computer Security: 20 years of securing controls (or trying to): black swans and convergence

    While eagerly expected by experts, the first dominant incident on control systems reported by the media was the Stuxnet attack of 2010 against the Iranian nuclear programme allegedly conducted by some secret services

    Explore →

  • Computer Security: 20 years of securing controls (or trying to): nothing has changed?

    Computer Security: 20 years of securing controls (or trying to): nothing has changed?

    20 years ago, control systems used to be stand-alone systems, usually decoupled from the larger enterprise networks, using their own network cabling infrastructures and programming languages dedicated to control systems. But no more…

    Explore →

  • Computer Security: CERN, beautified

    Computer Security: CERN, beautified

    The Computer Security Office is planning to improve the security posture of CERN’s web presence, making it a bit more beautiful than before

    Explore →

  • Computer Security: “ClickFix”, a nasty copy & paste

    Computer Security: “ClickFix”, a nasty copy & paste

    “ClickFixing”, or the art of luring you into executing a very simple string of copy/paste-like tasks to install malware on your computer

    Explore →

  • Computer Security: Block ads, stay clean

    Computer Security: Block ads, stay clean

    The main ways to get your computer infected these days are clicking on the wrong link, accessing the wrong website and/or installing the wrong software…

    Explore →

  • Computer Security: easily applied

    Computer Security: easily applied

    To make your life easier, the Computer Security Office has compiled four shortlists of “Security Principles”

    Explore →

  • Computer Security: Spam protection for phone calls

    Computer Security: Spam protection for phone calls

    Unsolicited marketing and fraudulent calls are unfortunately very common nowadays. Although total protection is impossible, the CERN Telephony Service has implemented several mechanisms to reduce such annoying calls to all CERN telephone numbers

    Explore →

  • Computer Security: Internet of Damn Insecure Stupid Things

    Computer Security: Internet of Damn Insecure Stupid Things

    Here are some examples of the Internet of Damn Insecure Stupid Things that were deployed (or intended to be) at CERN. Be prepared to shake your head

    Explore →

  • Computer Security: TN v3.0

    Computer Security: TN v3.0

    The worlds of IT and control systems have changed drastically thanks to virtualisation, containers, big data, machine learning, artificial intelligence, large language models… CERN needs to evolve towards Technical Network v3.0

    Explore →

  • Computer Security: 5 ways to remotely connect to CERN

    Computer Security: 5 ways to remotely connect to CERN

    With the roll-out of 2-factor authentication for the CERN Single Sign-On now concluded, the next step required by the 2023 CERN cybersecurity audit is to streamline all methods for remotely connecting to CERN

    Explore →