acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Third Edition of Ross Anderson’s Security Engineering
From Schneier on Security

The Third Edition of Ross Anderson’s Security Engineering

Ross Anderson’s fantastic textbook, Security Engineering, will have a third edition. The book won’t be published until December, but Ross has been making drafts...

US Space Cybersecurity Directive
From Schneier on Security

US Space Cybersecurity Directive

The Trump Administration just published “Space Policy Directive – 5“: “Cybersecurity Principles for Space Systems.” It’s pretty general: Principles. (a) Space systems...

More on NIST’s Post-Quantum Cryptography
From Schneier on Security

More on NIST’s Post-Quantum Cryptography

Back in July, NIST selected third-round algorithms for its post-quantum cryptography standard. Recently, Daniel Apon of NIST gave a talk detailing the selection...

More on NIST’s Post-Quantum Cryptography
From Schneier on Security

More on NIST’s Post-Quantum Cryptography

Back in July, NIST selected third-round algorithms for its post-quantum cryptography standard. Recently, Daniel Apon of NIST gave a talk detailing the selection...

More on NIST's Post-Quantum Cryptography
From Schneier on Security

More on NIST's Post-Quantum Cryptography

Back in July, NIST selected third-round algorithms for its post-quantum cryptography standard. Recently, Daniel Apon of NIST gave a talk detailing the selection...

Schneier.com is Moving
From Schneier on Security

Schneier.com is Moving

I'm switching my website software from Movable Type to Wordpress, and moving to a new host. The migration is expected to last from approximately 3 AM EST Monday...

Schneier.com is Moving
From Schneier on Security

Schneier.com is Moving

I’m switching my website software from Movable Type to WordPress, and moving to a new host. The migration is expected to last from approximately 3 AM EST Monday...

Schneier.com is Moving
From Schneier on Security

Schneier.com is Moving

I’m switching my website software from Movable Type to WordPress, and moving to a new host. The migration is expected to last from approximately 3 AM EST Monday...

Friday Squid Blogging: Morning Squid
From Schneier on Security

Friday Squid Blogging: Morning Squid

Asa ika means "morning squid" in Japanese. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read...

Friday Squid Blogging: Morning Squid
From Schneier on Security

Friday Squid Blogging: Morning Squid

Asa ika means “morning squid” in Japanese. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...

Friday Squid Blogging: Morning Squid
From Schneier on Security

Friday Squid Blogging: Morning Squid

Asa ika means “morning squid” in Japanese. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...

Hacking AI-Graded Tests
From Schneier on Security

Hacking AI-Graded Tests

The company Edgenuity sells AI systems for grading tests. Turns out that they just search for keywords without doing any actual semantic analysis....

Hacking AI-Graded Tests
From Schneier on Security

Hacking AI-Graded Tests

The company Edgenuity sells AI systems for grading tests. Turns out that they just search for keywords without doing any actual semantic analysis.

Hacking AI-Graded Tests
From Schneier on Security

Hacking AI-Graded Tests

The company Edgenuity sells AI systems for grading tests. Turns out that they just search for keywords without doing any actual semantic analysis.

2017 Tesla Hack
From Schneier on Security

2017 Tesla Hack

Interesting story of a class break against the entire Tesla fleet....

2017 Tesla Hack
From Schneier on Security

2017 Tesla Hack

Interesting story of a class break against the entire Tesla fleet.

2017 Tesla Hack
From Schneier on Security

2017 Tesla Hack

Interesting story of a class break against the entire Tesla fleet.

Insider Attack on the Carnegie Library
From Schneier on Security

Insider Attack on the Carnegie Library

Greg Priore, the person in charge of the rare book room at the Carnegie Library, stole from it for almost two decades before getting caught. It's a perennial problem...

Insider Attack on the Carnegie Library
From Schneier on Security

Insider Attack on the Carnegie Library

Greg Priore, the person in charge of the rare book room at the Carnegie Library, stole from it for almost two decades before getting caught. It’s a perennial problem...

Insider Attack on the Carnegie Library
From Schneier on Security

Insider Attack on the Carnegie Library

Greg Priore, the person in charge of the rare book room at the Carnegie Library, stole from it for almost two decades before getting caught. It’s a perennial problem...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account