The best way to guard against becoming a target of social engineering is to familiarize yourself with the strategies, psychological hooks, and technological means...Alex Vakulov From BLOG@CACM | August 21, 2023 at 03:34 PM
Automated testing in software development significantly diminishes routine work and saves time, allowing programmers to work more effectively.
Yegor Bugayenko From BLOG@CACM | August 4, 2023 at 11:09 PM
The importance of information security technologies cannot be overstated, given how deeply integrated gadgets have become in our lives.
Alex Vakulov From BLOG@CACM | May 31, 2023 at 11:26 AM
With the advent of Large Language Models (LLMs) and tools like GitHub CoPilot, I think we’re a step closer towards a world where software can be created by anyone...Jason Hong From BLOG@CACM | February 17, 2023 at 03:11 PM
A discussion of the most common phone scams, how they work, and how to protect yourself from them.
Alex Tray From BLOG@CACM | January 24, 2023 at 03:24 PM
These practices help technical professionals ensure their organizations' data is protected and can be recovered quickly.
Alex Tray From BLOG@CACM | January 3, 2023 at 10:14 AM
A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.
Alex Vakulov From BLOG@CACM | October 18, 2022 at 12:58 PM
Conflicts and disputes can arise between these adjacent teams; it is impossible to avoid them in the process of launching new products. And they certainly require...Alex Vakulov From BLOG@CACM | August 29, 2022 at 11:09 AM
A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.
Alex Vakulov From BLOG@CACM | August 10, 2022 at 01:24 PM
The purpose of this blog post is to present an anonymization method that can be applied to the digital attributes of personal data.
Alina Alemaskina and Andrei Sukhov From BLOG@CACM | February 16, 2022 at 12:29 PM