Revised computer security rules
Revised computer security rulesAt its second meeting, the Computer Security Board has formally approved several Subsidiary Rules to the Use of CERN computing facilities (Operational Circular No. 5,...
View ArticleDocument Management Systems – Guidelines
Document Management Systems – GuidelinesOver the years, CERN’s workflows and activities have resulted in a variety of software solutions being used to manage, store and track digital records. Based on...
View ArticleData Classification Policy
Data Classification PolicyCERN has just released, for internal distribution only, the Data Classification Policy document, which establishes a framework for classifying professional data entrusted to...
View ArticleComputer Security: Don’t let your data walk away
Computer Security: Don’t let your data walk awayData confidentiality, while not paramount for CERN’s physics data, is still important when it comes to protecting sensitive contractual, financial,...
View ArticleComputer Security: When free+free becomes costly
Computer Security: When free+free becomes costlyAt last. With Christmas another 300 days away, the season of the “free” is over. Or is it? Not all software, even if labelled “open source” or “free”, is...
View ArticleInternational Geneva celebrates the International Year of Quantum
International Geneva celebrates the International Year of Quantum Panel including representatives of permanent missions in Geneva (Italy, Mexico, Kenya, Vanuatu, Slovenia, India and the Kingdom of...
View ArticleComputer Security: 2025 – Plugging holes
Computer Security: 2025 – Plugging holesCERN’s computing infrastructure is vast and heterogeneous, dynamic and complex. Keeping it secure is a marathon– trying to stay ahead of new deployments in order...
View ArticleComputer Security: Store your data right
Computer Security: Store your data right What chaos! A cacophony of data everywhere you look! Today, if asked where you store your professional documents and data at CERN, you might give any number of...
View ArticleComputer Security: The cost of compromise
Computer Security: The cost of compromiseRecently, the Computer Security Office reported on a cybersecurity incident at a remote Tier 2 site of the Worldwide LHC Computing Grid (WLCG). Compromised to...
View ArticleComputer Security: ThisIsAVeryGoodPassword
Computer Security: ThisIsAVeryGoodPassword“Weze-Xupe”, “a^2+b**2=sqr(c)”, “IXdKKaspdd!” or “dogs+F18” have long been the state of art for passwords – using a mixture of capital and lower-case letters,...
View Article