News
News
Computer Security: Free croissants for everyone
We strongly encourage everyone to lock their computer with a password-protected screen lock when leaving the device unattended
Computer Security: Security Rules revised
All owners of computing resources connected to or provided to them by CERN’s computing facilities are ultimately responsible for the compliance of their actions and their resources with these Rules
Computer Security: 2FA – 2 Fine Astuces
To make your life under 2FA a bit easier, however, here are 2 Fine Astuces (tips) to improve 2FA usability
CERN teams up with Luxembourg and the World Food Programme to tackle global hunger
The new partnership aims to leverage state-of-the-art AI technology to speed up progress towards a world with zero hunger
Computer Security: Bug Bounty begins
The Bug Bounty programme, or how to create the necessary incentives to invite hackers to start hacking CERN…
Computer Security: Happy Birthday, Virus!
35 years ago, on 9 October 1989, the CERN Computer Security team issued for the first time a “Computer Virus Warning to all users of IBM Compatible PCs”
Computer Security: AI attacks
While AI – coming with its own computer security problems – might make daily life easier, it will also open up a new series of attack vectors
How CERN IT keeps up with the data deluge
At CERN we are used to dealing with a deluge of data, but the numerical value behind the word “deluge” has significantly evolved over the years
Computer security: security workouts
Just like your summer exercise regime, computer security requires permanent training to stay fit and healthy
CERN70: Where the Web was born…
Tim Berners-Lee wrote a proposal in 1989 for an information management system called the World Wide Web