The Computer Security team decided to engage with ethical hackers and launched a three (and a half) staged approach towards improving the security of CERN’s Internet presence and beyond
There are many different ways to unlock your smartphone: swiping patterns, PIN numbers, passwords, biometric fingerprints or face recognition. Some are more secure, some less so
With ongoing vulnerability scans of CERN’s internet presence, the Computer Security team’s plans to perform penetration testing against selected targets visible to the internet
Bravo to all those who participated in the Bull**** Bingo and sent us their solution. Some people were wondering why their responses were not correct… Good point, so let’s walk through that Bingo
These paradigms “KISS ─ keep it simple, stupid” and “defence-in-depth” go hand in hand once we all jointly pick the right two of “cheap, convenient, secure”
Until recently, universities had been attacked only very occasionally. But the last year has also seen major attacks against accelerators and telescopes
Computer security comes with clear mantras: “Defence-in-depth”, where security controls are applied at every level of the hardware and software stack, and “Keep it simple, stupid”, to avoid unnecessary complexity