Computer security: security workouts
Computer security: security workoutsSummertime. The moment to get in shape. Jogging. Step aerobics. CrossFit. Push-ups. Shadow-boxing. Zumba. Pilates. Whatever. Or to just stay as you are ─ fit and...
View ArticleHow CERN IT keeps up with the data deluge
How CERN IT keeps up with the data delugeThe new Prévessin Data Centre at CERN. (Image: CERN)At CERN, we are used to dealing with a deluge of data, but the numerical value behind the word “deluge” has...
View ArticleComputer Security: AI attacks
Computer Security: AI attacksWhat a cool, new, artificially intelligent world! There’s ChatGPT to write your love letter, CV or paper. Loudly or Udio to compose your own music. DALL-E to produce...
View ArticleComputer Security: Happy Birthday, Virus!
Computer Security: Happy Birthday, Virus! 35 years ago, on 9 October 1989, the CERN Computer Security team issued for the first time a “Computer Virus Warning to all users of IBM Compatible PCs” (see...
View ArticleComputer Security: Bug Bounty begins
Computer Security: Bug Bounty begins“@CERN #BugBounty Program launches today! Did you know that the WWW as we know it today was created at CERN? Thanks to this fundamental invention, you now have the...
View ArticleCERN teams up with Luxembourg and the World Food Programme to tackle global...
CERN teams up with Luxembourg and the World Food Programme to tackle global hunger A new partnership funded by the Government of Luxembourg, the United Nations World Food Programme (WFP), the...
View ArticleComputer Security: 2FA – 2 Fine Astuces
Computer Security: 2FA – 2 Fine AstucesWith the 2nd Fase Accomplished, the roll-out of 2-Factor Authentication (2FA) will soon be complete. After enrolling all CERN staff in 2023, in 2024 we deployed...
View ArticleComputer Security: Security Rules revised
Computer Security: Security Rules revisedWith the 2023 cybersecurity audit and the subsequent approval by CERN’s Extended Directorate of the new Cybersecurity Policy, which parallels, complements and...
View ArticleComputer Security: Free croissants for everyone
Computer Security: Free croissants for everyone(Image: CERN)“I am looking for a partner, either male or female, to attend salsa lessons with. I have a great body and enjoy rubbing it against other...
View ArticleComputer Security: A security balancing act
Computer Security: A security balancing actI can confirm that “computer security” is probably not the sexiest subject at a dinner party. For sure, it is not the most popular subject at CERN. No wonder,...
View ArticleIt’s beginning to look a lot like Quantum
It’s beginning to look a lot like QuantumEarly exploration of quantum technologies – both within the scientific domain and on the wider societal level – is essential, even if it may take decades before...
View ArticleComputer Security: Are you a team player?
Computer Security: Are you a team player?The field of research is a team sport. Long gone are the days when one individual could make the change, the discovery of the century, and win the big prize....
View ArticleRevised computer security rules
Revised computer security rulesAt its second meeting, the Computer Security Board has formally approved several Subsidiary Rules to the Use of CERN computing facilities (Operational Circular No. 5,...
View ArticleNew AI Companion features on CERN Zoom
New AI Companion features on CERN Zoom As of 6 January 2025, Zoom’s AI Companion is officially available on CERN Zoom. This handy tool is designed to make your life easier, with features such as...
View ArticleDocument Management Systems – Guidelines
Document Management Systems – GuidelinesOver the years, CERN’s workflows and activities have resulted in a variety of software solutions being used to manage, store and track digital records. Based on...
View ArticleData Classification Policy
Data Classification PolicyCERN has just released, for internal distribution only, the Data Classification Policy document, which establishes a framework for classifying professional data entrusted to...
View ArticleComputer Security: Don’t let your data walk away
Computer Security: Don’t let your data walk awayData confidentiality, while not paramount for CERN’s physics data, is still important when it comes to protecting sensitive contractual, financial,...
View ArticleComputer Security: When free+free becomes costly
Computer Security: When free+free becomes costlyAt last. With Christmas another 300 days away, the season of the “free” is over. Or is it? Not all software, even if labelled “open source” or “free”, is...
View ArticleInternational Geneva celebrates the International Year of Quantum
International Geneva celebrates the International Year of Quantum Panel including representatives of permanent missions in Geneva (Italy, Mexico, Kenya, Vanuatu, Slovenia, India and the Kingdom of...
View ArticleComputer Security: 2025 – Plugging holes
Computer Security: 2025 – Plugging holesCERN’s computing infrastructure is vast and heterogeneous, dynamic and complex. Keeping it secure is a marathon– trying to stay ahead of new deployments in order...
View Article