News
News
Digital archaeology: new LEP data now available to all
Retrieving and preserving access to data from experiments that ran in the 90s is a complex task carried out by passionate experts in the IT department
Computer Security: Don’t print naked
If you’re interested in what’s going on at CERN, in professional projects and plans, or in private problems and parties, hanging out at one of CERN’s printers is a very effective approach...
Computer Security: Dear summer students, welcome!
A warm welcome to the summer-student class of 2024! In order to make your digital life as comfortable as possible, here are a few things you need to know
Computer Security: Blind trust means money lost
This spring has seen two fraudulent transactions on the CERN Marketplace. In both cases, the fraudsters were advertising vacant apartments that they didn’t own
Computer Security: The better generation
To all those fine folks out there who are interested in computer security, thank you!
Computer Security: WhiteHat & Zebra trainings are back
Hand-in-hand with the Computer Security team, you, as an excellent software developer and experienced programmer, have followed the right courses to put in place a secure software programming and code development life-cycle...
Computer Security: Pay per vulnerability
The Computer Security team decided to engage with ethical hackers and launched a three (and a half) staged approach towards improving the security of CERN’s Internet presence and beyond
CERN donates computing equipment to South Africa
On 9 April 2024, a ceremony at CERN marked the donation of computing equipment to the Tshwane University of Technology in South Africa
The next-generation triggers for CERN detectors
The recently launched Next-Generation Triggers project is set to remarkably increase the efficiency, sensitivity and modelling of CERN experiments
Computer Security: Swipes vs PINs vs passwords vs you
There are many different ways to unlock your smartphone: swiping patterns, PIN numbers, passwords, biometric fingerprints or face recognition. Some are more secure, some less so