Hand-in-hand with the Computer Security team, you, as an excellent software developer and experienced programmer, have followed the right courses to put in place a secure software programming and code development life-cycle...
The Computer Security team decided to engage with ethical hackers and launched a three (and a half) staged approach towards improving the security of CERN’s Internet presence and beyond
There are many different ways to unlock your smartphone: swiping patterns, PIN numbers, passwords, biometric fingerprints or face recognition. Some are more secure, some less so
With ongoing vulnerability scans of CERN’s internet presence, the Computer Security team’s plans to perform penetration testing against selected targets visible to the internet
Bravo to all those who participated in the Bull**** Bingo and sent us their solution. Some people were wondering why their responses were not correct… Good point, so let’s walk through that Bingo
These paradigms “KISS ─ keep it simple, stupid” and “defence-in-depth” go hand in hand once we all jointly pick the right two of “cheap, convenient, secure”
Until recently, universities had been attacked only very occasionally. But the last year has also seen major attacks against accelerators and telescopes