20 years ago, control systems used to be stand-alone systems, usually decoupled from the larger enterprise networks, using their own network cabling infrastructures and programming languages dedicated to control systems. But no more…
The main ways to get your computer infected these days are clicking on the wrong link, accessing the wrong website and/or installing the wrong software...
Unsolicited marketing and fraudulent calls are unfortunately very common nowadays. Although total protection is impossible, the CERN Telephony Service has implemented several mechanisms to reduce such annoying calls to all CERN telephone numbers
The worlds of IT and control systems have changed drastically thanks to virtualisation, containers, big data, machine learning, artificial intelligence, large language models... CERN needs to evolve towards Technical Network v3.0
With the roll-out of 2-factor authentication for the CERN Single Sign-On now concluded, the next step required by the 2023 CERN cybersecurity audit is to streamline all methods for remotely connecting to CERN
International collaboration and incident response is key. Because an incident in the Antipodes might directly affect the IT services at CERN. And has done so
It should be common knowledge among software developers that writing software with as few weaknesses, vulnerabilities and flaws as possible is the most cost-efficient solution