acm-header
Sign In

Communications of the ACM

Recent Interviews


bg-corner

Security Guru Pledges to Strengthen Critical Computers
From ACM Opinion

Security Guru Pledges to Strengthen Critical Computers

Stuxnet, a piece of malicious software discovered in 2010, targeted industrial software controlling Iran’s uranium-enrichment centrifuges. But the code got loose—and...

Christopher Soghoian
From ACM Opinion

Christopher Soghoian

Christopher Soghoian sniffs out security holes and privacy shortcomings on the Web. Then he urges companies that are responsible—Google, AT&T, and Dropbox have...

What Facebook Knows
From ACM News

What Facebook Knows

If Facebook were a country, a conceit that founder Mark Zuckerberg has entertained in public, its 900 million members would make it the third largest in the world...

Making the Case For Security
From ACM News

Making the Case For Security

Major corporations have made serious mistakes with information security recently, resulting in spectacular failures to protect business and customer records....

The Brainy Learning Algorithms of Numenta
From ACM News

The Brainy Learning Algorithms of Numenta

How the inventor of the PalmPilot studied the workings of the human brain to help companies turn a deluge of data into business intelligence.

How Secure Is Cloud Computing?
From ACM TechNews

How Secure Is Cloud Computing?

The recent ACM Cloud Computing Security Workshop was the first event devoted specifically to the security of cloud computing systems. Speaker Whitfield Diffie,...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account