acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

The Life-or-Death Importance of Medical Device Security
From BLOG@CACM

The Life-or-Death Importance of Medical Device Security

Cybersecurity was not always top of mind when these devices were being created.

Duped No More: Navigating the Maze of Social Engineering Schemes
From BLOG@CACM

Duped No More: Navigating the Maze of Social Engineering Schemes

The best way to guard against becoming a target of social engineering is to familiarize yourself with the strategies, psychological hooks, and technological means...

Navigating the 2023 Cybersecurity Landscape
From BLOG@CACM

Navigating the 2023 Cybersecurity Landscape

The importance of information security technologies cannot be overstated, given how deeply integrated gadgets have become in our lives.

Beyond Passwords: The Path to Stronger Authentication Mechanisms
From BLOG@CACM

Beyond Passwords: The Path to Stronger Authentication Mechanisms

The inherent risks associated with passwords stem from their very nature.

Cybersecurity Mistakes to Avoid at All Costs
From BLOG@CACM

Cybersecurity Mistakes to Avoid at All Costs

Preventing unauthorized access or misuse of confidential data.

The Key to Successful Threat Intelligence
From BLOG@CACM

The Key to Successful Threat Intelligence

A modern Information Security perspective.

Choosing a DAST Solution: What to Pay Attention To
From BLOG@CACM

Choosing a DAST Solution: What to Pay Attention To

The tool characteristics and parameters you need to pay attention to, and the product types currently available on the market.

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
From BLOG@CACM

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?

A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.

DevSecOps: Resolving Disagreements Between Developers and Security Teams
From BLOG@CACM

DevSecOps: Resolving Disagreements Between Developers and Security Teams

Conflicts and disputes can arise between these adjacent teams; it is impossible to avoid them in the process of launching new products. And they certainly require...

A History of One Brute-Force Attack
From BLOG@CACM

A History of One Brute-Force Attack

A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.

Is It Difficult to Bypass the Protection That Uses Big Data?
From BLOG@CACM

Is It Difficult to Bypass the Protection That Uses Big Data?

Big data analytics systems identify signs of unauthorized activity in vast arrays of structured and unstructured data.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account