acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Unlocking the Potential of Zero-Knowledge Proofs in Blockchain
From BLOG@CACM

Unlocking the Potential of Zero-Knowledge Proofs in Blockchain

The intricate world of zero-knowledge proofs and their role within the blockchain.

Are You Confident in Your Backups?
From BLOG@CACM

Are You Confident in Your Backups?

Assessing data security.

All Photos are Fake Until Proven Real
From BLOG@CACM

All Photos are Fake Until Proven Real

The blurred lines of photographic reality in the AI Era.

The Life-or-Death Importance of Medical Device Security
From BLOG@CACM

The Life-or-Death Importance of Medical Device Security

Cybersecurity was not always top of mind when these devices were being created.

Duped No More: Navigating the Maze of Social Engineering Schemes
From BLOG@CACM

Duped No More: Navigating the Maze of Social Engineering Schemes

The best way to guard against becoming a target of social engineering is to familiarize yourself with the strategies, psychological hooks, and technological means...

Automated Tests Are the Safety Net
From BLOG@CACM

Automated Tests Are the Safety Net

Automated testing in software development significantly diminishes routine work and saves time, allowing programmers to work more effectively.

Navigating the 2023 Cybersecurity Landscape
From BLOG@CACM

Navigating the 2023 Cybersecurity Landscape

The importance of information security technologies cannot be overstated, given how deeply integrated gadgets have become in our lives.

Beyond Passwords: The Path to Stronger Authentication Mechanisms
From BLOG@CACM

Beyond Passwords: The Path to Stronger Authentication Mechanisms

The inherent risks associated with passwords stem from their very nature.

A Year Embedded in the Crypto-NFT Space
From BLOG@CACM

A Year Embedded in the Crypto-NFT Space

From digital ownership to artistic communities.

Cybersecurity Mistakes to Avoid at All Costs
From BLOG@CACM

Cybersecurity Mistakes to Avoid at All Costs

Preventing unauthorized access or misuse of confidential data.

Using GitHub CoPilot is Like Having a Superpower
From BLOG@CACM

Using GitHub CoPilot is Like Having a Superpower

With the advent of Large Language Models (LLMs) and tools like GitHub CoPilot, I think we’re a step closer towards a world where software can be created by anyone...

What Google Should Really Be Worried About
From BLOG@CACM

What Google Should Really Be Worried About

How sewers of lies could spell the end of Web search.

Why Data Security Is An Issue For Business Phone Systems In 2023
From BLOG@CACM

Why Data Security Is An Issue For Business Phone Systems In 2023

A discussion of the most common phone scams, how they work, and how to protect yourself from them.

5 Best Practices for Cloud-Based Backup and Recovery in 2023
From BLOG@CACM

5 Best Practices for Cloud-Based Backup and Recovery in 2023

These practices help technical professionals ensure their organizations' data is protected and can be recovered quickly.

The Key to Successful Threat Intelligence
From BLOG@CACM

The Key to Successful Threat Intelligence

A modern Information Security perspective.

Data Backup and VM Modernization: How-to Guide
From BLOG@CACM

Data Backup and VM Modernization: How-to Guide

A guide to VM modernization when dealing with data backups.

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
From BLOG@CACM

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?

A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.

DevSecOps: Resolving Disagreements Between Developers and Security Teams
From BLOG@CACM

DevSecOps: Resolving Disagreements Between Developers and Security Teams

Conflicts and disputes can arise between these adjacent teams; it is impossible to avoid them in the process of launching new products. And they certainly require...

A History of One Brute-Force Attack
From BLOG@CACM

A History of One Brute-Force Attack

A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.

Data Anonymization Using the Random Sum Method
From BLOG@CACM

Data Anonymization Using the Random Sum Method

The purpose of this blog post is to present an anonymization method that can be applied to the digital attributes of personal data.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account