acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Hottest It Skill? Cybersecurity
From ACM TechNews

Hottest It Skill? Cybersecurity

As they face increased activity by hackers and cybercriminals, U.S. corporations are accelerating their hiring of cybersecurity specialists, with open jobs reaching...

Thwarting the Cleverest Attackers
From ACM Careers

Thwarting the Cleverest Attackers

Savvy hackers can steal a computer's secrets by timing its data storage transactions or measuring its power use. New research shows how to stop them.

Researchers Work to Make Future Smart Grid Safe and Secure
From ACM Careers

Researchers Work to Make Future Smart Grid Safe and Secure

Just as malicious Internet users try to spread harmful viruses through computer networks, attackers on the future power network could cause outages and other harmful...

Going With the Flow: Google's Secret Switch to the Next Wave of Networking
From ACM News

Going With the Flow: Google's Secret Switch to the Next Wave of Networking

In early 1999, an associate computer science professor at UC Santa Barbara climbed the steps to the second floor headquarters of a small startup in Palo Alto, and...

Israel's Rocket-Hunting Ace Got His Start Playing Warcraft
From ACM News

Israel's Rocket-Hunting Ace Got His Start Playing Warcraft

While many of the boys in Idan Yahya's high school class were buffing up and preparing themselves for selection into elite combat units, this gawky teenager was...

Move Over, Eye Candy. Here Comes the Business Tech Boom
From ACM Careers

Move Over, Eye Candy. Here Comes the Business Tech Boom

Sometimes an IPO is more than just another IPO, and that's the case with Palo Alto Networks, which has just filed to go public.

The Enemy Within
From ACM Careers

The Enemy Within

Companies' IT staffs often hold the keys to the castle. And that's the problem.

Stanford Grad Student Investigates Online Privacy
From ACM Careers

Stanford Grad Student Investigates Online Privacy

Stanford's Workshop on Internet Tracking, Advertising and Privacy last year was attended by executives from big valley tech companies, important privacy researchers...

Teen Wins ­k Cyber Security Challenge
From ACM Careers

Teen Wins ­k Cyber Security Challenge

Jonathan Millican, a first year computer science student at Cambridge University, was named the UK Cyber Security Champion at the Cyber Security Challenge UK Awards...

An App That Helps You Cozy ­p to Strangers
From ACM News

An App That Helps You Cozy ­p to Strangers

Paul Davison is in a hurry. Not just to board the plane that's about to take him to his father's retirement party in San Diego, or to get through the talking points...

Dhs, Not Nsa, Should Lead Cybersecurity, Pentagon Official Says
From ACM News

Dhs, Not Nsa, Should Lead Cybersecurity, Pentagon Official Says

In the midst of an ongoing turf battle over how big a role the National Security Agency should play in securing the nation’s critical infrastructure, a Defense...

From ACM Careers

Pwnium: Rewards For Exploits

This year at the CanSecWest security conference, we will once again sponsor rewards for Google Chrome exploits. This complements and extends our Chromium Security...

Stress and Burnout Common in Info Security Field
From ACM Careers

Stress and Burnout Common in Info Security Field

IT security professionals are experiencing extreme levels of stress and burnout, but they have few places to turn for help.

From ACM Careers

Defense Spending on Cyber, Special Operations Stays Steady as ­.S. Seeks Savings in Tough Year

Spending on two of the Pentagon’s top priorities, cybersecurity and special operations forces, would largely remain flat or dip slightly in 2013 under the Defense...

Why 'big Data' Is a Magnet For Startups
From ACM Careers

Why 'big Data' Is a Magnet For Startups

Armies of entrepreneurs are trying to make money sifting through mountains of data from the Web and other sources, but one of the biggest challenges is simply getting...

From ACM Careers

Fbi Seeks Social Media Monitoring Tool

The goal is to use the tool to keep on top of breaking events, incidents and emerging threats, the agency said in a recent Request for Information from IT vendors...

Genetics Inspired Research Prevents Cyber Attacks
From ACM Careers

Genetics Inspired Research Prevents Cyber Attacks

Leveraging the concept of "survival of the fittest," Wake Forest University researchers are fighting the continual evolution of computer viruses, worms and malware...

Oscars Vote Vulnerable to Cyber Attack ­nder New Online System, Experts Warn
From ACM Careers

Oscars Vote Vulnerable to Cyber Attack ­nder New Online System, Experts Warn

Academy to switch to electronic ballots in 2013 — but move from paper voting does not eliminate prospect of foul play.

From ACM News

What The Fbi Wants In A Social Media Monitoring App

The FBI has raised eyebrows in the tech world with a public document that asks for advice on how to harvest information from social networking sites.

Call For Cyberwar 'peacekeepers' Force
From ACM Careers

Call For Cyberwar 'peacekeepers' Force

There will soon be a need for a world peacekeeping force in cyberspace, according to John Bumgarner, an official with the U.S. Cyber Consequences Unit in Washington...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account