Quantcast
Browsing latest articles
Browse All 243 View Live

Revised computer security rules

Revised computer security rulesAt its second meeting, the Computer Security Board has formally approved several Subsidiary Rules to the Use of CERN computing facilities (Operational  Circular No. 5,...

View Article


Document Management Systems – Guidelines

Document Management Systems – GuidelinesOver the years, CERN’s workflows and activities have resulted in a variety of software solutions being used to manage, store and track digital records. Based on...

View Article


Data Classification Policy

Data Classification PolicyCERN has just released, for internal distribution only, the Data Classification Policy document, which establishes a framework for classifying professional data entrusted to...

View Article

Computer Security: Don’t let your data walk away

Computer Security: Don’t let your data walk awayData confidentiality, while not paramount for CERN’s physics data, is still important when it comes to protecting sensitive contractual, financial,...

View Article

Computer Security: When free+free becomes costly

Computer Security: When free+free becomes costlyAt last. With Christmas another 300 days away, the season of the “free” is over. Or is it? Not all software, even if labelled “open source” or “free”, is...

View Article


Image may be NSFW.
Clik here to view.

International Geneva celebrates the International Year of Quantum

International Geneva celebrates the International Year of Quantum Panel including representatives of permanent missions in Geneva (Italy, Mexico, Kenya, Vanuatu, Slovenia, India and the Kingdom of...

View Article

Computer Security: 2025 – Plugging holes

Computer Security: 2025 – Plugging holesCERN’s computing infrastructure is vast and heterogeneous, dynamic and complex. Keeping it secure is a marathon– trying to stay ahead of new deployments in order...

View Article

Computer Security: Store your data right

Computer Security: Store your data right What chaos! A cacophony of data everywhere you look! Today, if asked where you store your professional documents and data at CERN, you might give any number of...

View Article


Computer Security: The cost of compromise

Computer Security: The cost of compromiseRecently, the Computer Security Office reported on a cybersecurity incident at a remote Tier 2 site of the Worldwide LHC Computing Grid (WLCG). Compromised to...

View Article


Computer Security: ThisIsAVeryGoodPassword

Computer Security: ThisIsAVeryGoodPassword“Weze-Xupe”, “a^2+b**2=sqr(c)”, “IXdKKaspdd!” or “dogs+F18” have long been the state of art for passwords – using a mixture of capital and lower-case letters,...

View Article
Browsing latest articles
Browse All 243 View Live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>