On a sleek white coffee table in Apple CEO Tim Cook's fourth-floor office in late July, beneath framed posters of Robert F. Kennedy, the Rev. Martin Luther King...The Washington Post From ACM Opinion | August 15, 2016
You devoted your life to human-driven transportation, engineering SUVs at Ford and taking Hyundai (as U.S. CEO and president) to record levels of sales in the U...Bloomberg Businessweek From ACM Opinion | August 4, 2016
Rukmini Callimachi is arguably the best reporter on the most important beat in the world. As a New York Times correspondent covering terrorism, her work explores...Wired From ACM Opinion | August 3, 2016
When it comes to warfare—the weapons, the budgets, the personnel—America is king. But the United States has not yet conquered cyberwarfare. From ACM Opinion | August 3, 2016
When he started at the CIA, Sean Roche recalls how little solid data the U.S. spy agency had on what was going on inside the Kremlin.Bloomberg From ACM Opinion | August 1, 2016
Apple's legal battle over encryption dominated headlines earlier this year, but another tech giant is fighting a quieter legal war over user privacy: Microsoft....The Washington Post From ACM Opinion | July 25, 2016
When Edward Snowden leaked highly classified secrets about government spying, he changed the way the world thinks of cybersecurity.CNET From ACM Opinion | July 22, 2016
Alex Gibney's new documentary, Zero Days, looks at the Stuxnet worm—a cyber weapon developed by the U.S. and Israel.NPR All Things Considered From ACM Opinion | July 5, 2016
Cisco Systems designs, makes, and sells the routers, switches, and other networking equipment with which businesses connect their computers, manage data centers...Technology Review From ACM Opinion | June 14, 2016
A sense of menace stirs right off the elevator on the fifth floor of Kaspersky Lab's Moscow headquarters, where a small television screen displays cyberthreatsa...The New York Times From ACM Opinion | June 10, 2016
Whitfield Diffie and Martin Hellman on their meeting, their research, and the results that billions use every day.
Leah Hoffmann From Communications of the ACM | June 1, 2016
The Edward Snowden leaks have accelerated the sophistication of encryption technologies by "about seven years," Director of National Intelligence James Clapper...The Christian Science Monitor From ACM Opinion | April 26, 2016
FBI Director James Comey gave a speech this week about encryption and privacy, repeating his argument that "absolute privacy" hampers law enforcement. But it was...NPR From ACM Opinion | April 11, 2016
The heated debate between the FBI and Apple over the encryption of the iPhone used by Syed Rizwan Farook, one of the two people who massacred 14 people in San Bernardino... From ACM Opinion | March 23, 2016
A hacking attack on a Las Vegas hotel company. A power grid blackout in the Ukraine. A series of industrial accidents at an Iranian nuclear enrichment lab.CNET From ACM Opinion | March 14, 2016
Shortly after Robert Hannigan took over the British signals-intelligence agency GCHQ in 2014, he implored technology companies to do more to facilitate investigations...Technology Review From ACM Opinion | March 14, 2016
Virtually everyone in technology knows about Kevin Mitnick, who in the 1970s, '80s and '90s was a notorious fugitive hacker on the run from the FBI.
Computerworld From ACM Opinion | March 9, 2016