acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Unlocking the Potential of Zero-Knowledge Proofs in Blockchain
From BLOG@CACM

Unlocking the Potential of Zero-Knowledge Proofs in Blockchain

The intricate world of zero-knowledge proofs and their role within the blockchain.

Are You Confident in Your Backups?
From BLOG@CACM

Are You Confident in Your Backups?

Assessing data security.

All Photos are Fake Until Proven Real
From BLOG@CACM

All Photos are Fake Until Proven Real

The blurred lines of photographic reality in the AI Era.

The Life-or-Death Importance of Medical Device Security
From BLOG@CACM

The Life-or-Death Importance of Medical Device Security

Cybersecurity was not always top of mind when these devices were being created.

Duped No More: Navigating the Maze of Social Engineering Schemes
From BLOG@CACM

Duped No More: Navigating the Maze of Social Engineering Schemes

The best way to guard against becoming a target of social engineering is to familiarize yourself with the strategies, psychological hooks, and technological means...

Automated Tests Are the Safety Net
From BLOG@CACM

Automated Tests Are the Safety Net

Automated testing in software development significantly diminishes routine work and saves time, allowing programmers to work more effectively.

Navigating the 2023 Cybersecurity Landscape
From BLOG@CACM

Navigating the 2023 Cybersecurity Landscape

The importance of information security technologies cannot be overstated, given how deeply integrated gadgets have become in our lives.

Beyond Passwords: The Path to Stronger Authentication Mechanisms
From BLOG@CACM

Beyond Passwords: The Path to Stronger Authentication Mechanisms

The inherent risks associated with passwords stem from their very nature.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account