³Ô¹ÏÍøÕ¾

Computer security articles turn 200

Recently, we celebrated the 200th Bulletin article focusing on various topics relating to computer security. Two hundred hopefully informative articles about the current situation of cyber-security at CERN. About best practices, guidelines and useful tools. About threat scenarios and current attack vectors. About new or established means of mitigation. About the workings of the Computer Security team. About policies and Do’s and Don’ts. Two hundred articles trying to raise your awareness and trying to help you to improve your approach to computer security- the security of your laptops, smartphones, tablets, e-mail accounts, passwords, software and systems – at CERN and at home.

While some articles were published a long time ago – the first ones were released in 2008 – they have never lost their relevance. Sometimes it is useful to crawl into the past and dig out information from them () and often these articles also provide guidelines for us when producing advisories for users. So for this 200th anniversary, we have produce a compilation of all the articles published so far. This compilation covers a plethora of topics, sorted into the notorious themes of “Computer Security”, i.e. the literal cyber-security of computers, “Mobile and Cloud Security”, “Network and Data Centre Security”, “Account and Password Security”, “Control Systems and IoT” – the Internet of Things -, “Secure Software Development”, “Data Protection and Privacy”, “Copyrights”, “Rules and Policies” and more. Giving a deeper insight into the computer security landscape, these articles are complementary to our Monthly Reports (), which usually depict the operational side of what is currently happening at CERN. You can download the compilation here (. Please feel free to share it with your colleagues, family and friends!

Do you want to learn more about computer security incidents and issues at CERN? Follow our Monthly Report (

/Public Release. View in full .