Computer Security: Are you a team player?
Computer Security: Are you a team player?The field of research is a team sport. Long gone are the days when one individual could make the change, the discovery of the century, and win the big prize....
View ArticleRevised computer security rules
Revised computer security rulesAt its second meeting, the Computer Security Board has formally approved several Subsidiary Rules to the Use of CERN computing facilities (Operational Circular No. 5,...
View ArticleNew AI Companion features on CERN Zoom
New AI Companion features on CERN Zoom As of 6 January 2025, Zoom’s AI Companion is officially available on CERN Zoom. This handy tool is designed to make your life easier, with features such as...
View ArticleDocument Management Systems – Guidelines
Document Management Systems – GuidelinesOver the years, CERN’s workflows and activities have resulted in a variety of software solutions being used to manage, store and track digital records. Based on...
View ArticleData Classification Policy
Data Classification PolicyCERN has just released, for internal distribution only, the Data Classification Policy document, which establishes a framework for classifying professional data entrusted to...
View ArticleComputer Security: Don’t let your data walk away
Computer Security: Don’t let your data walk awayData confidentiality, while not paramount for CERN’s physics data, is still important when it comes to protecting sensitive contractual, financial,...
View ArticleComputer Security: When free+free becomes costly
Computer Security: When free+free becomes costlyAt last. With Christmas another 300 days away, the season of the “free” is over. Or is it? Not all software, even if labelled “open source” or “free”, is...
View ArticleInternational Geneva celebrates the International Year of Quantum
International Geneva celebrates the International Year of Quantum Panel including representatives of permanent missions in Geneva (Italy, Mexico, Kenya, Vanuatu, Slovenia, India and the Kingdom of...
View ArticleComputer Security: 2025 – Plugging holes
Computer Security: 2025 – Plugging holesCERN’s computing infrastructure is vast and heterogeneous, dynamic and complex. Keeping it secure is a marathon– trying to stay ahead of new deployments in order...
View ArticleComputer Security: Store your data right
Computer Security: Store your data right What chaos! A cacophony of data everywhere you look! Today, if asked where you store your professional documents and data at CERN, you might give any number of...
View Article