acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Unlocking the Potential of Zero-Knowledge Proofs in Blockchain
From BLOG@CACM

Unlocking the Potential of Zero-Knowledge Proofs in Blockchain

The intricate world of zero-knowledge proofs and their role within the blockchain.

Are You Confident in Your Backups?
From BLOG@CACM

Are You Confident in Your Backups?

Assessing data security.

All Photos are Fake Until Proven Real
From BLOG@CACM

All Photos are Fake Until Proven Real

The blurred lines of photographic reality in the AI Era.

The Life-or-Death Importance of Medical Device Security
From BLOG@CACM

The Life-or-Death Importance of Medical Device Security

Cybersecurity was not always top of mind when these devices were being created.

Duped No More: Navigating the Maze of Social Engineering Schemes
From BLOG@CACM

Duped No More: Navigating the Maze of Social Engineering Schemes

The best way to guard against becoming a target of social engineering is to familiarize yourself with the strategies, psychological hooks, and technological means...

Automated Tests Are the Safety Net
From BLOG@CACM

Automated Tests Are the Safety Net

Automated testing in software development significantly diminishes routine work and saves time, allowing programmers to work more effectively.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account