Sign In

Communications of the ACM

BLOG@CACM



Cybersecurity in the Trump Era
From BLOG@CACM

Cybersecurity in the Trump Era

Deterrence is simply the wrong way to think about cybersecurity.

Fact Versus Frivolity in Facebook
From BLOG@CACM

Fact Versus Frivolity in Facebook

Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users. ...

The Real Lesson of the Alleged Russian Hack
From BLOG@CACM

The Real Lesson of the Alleged Russian Hack

Despite more than two decades of consistent public warnings that have reached the highest levels of government, cybersecurity throughout much of the world is in...

Stop Trying to Deter Cyberattacks
From BLOG@CACM

Stop Trying to Deter Cyberattacks

Whither cyber deterrence? In my view, let it wither.

A Presidential Policy Directive With Little Direction
From BLOG@CACM

A Presidential Policy Directive With Little Direction

Cybersecurity is integral in nature in a very connected world; the insecurity of some contributes to the vulnerability of all.

California's Internet Voting Initiatives
From BLOG@CACM

California's Internet Voting Initiatives

The vast majority of computer and network security experts agree that there is currently no way to adequately secure an online public election.

Toward a Discourse on Cyber Strategy
From BLOG@CACM

Toward a Discourse on Cyber Strategy

Efforts to understand how advanced information technologies will affect future conflicts seem to be missing, or are taking place far from the public eye.

A Farewell to (Virtual) Arms?
From BLOG@CACM

A Farewell to (Virtual) Arms?

The potential for a Sino-American cyber arms control agreement is intriguing, despite three very troubling flaws.

Deterrence after Stuxnet
From BLOG@CACM

Deterrence after Stuxnet

In the cyber context, "Mutual Assured Destruction" becomes "Mutual Assured Disruption." 

The Robots are Taking Over! (Perhaps Not Quite Yet.)
From BLOG@CACM

The Robots are Taking Over! (Perhaps Not Quite Yet.)

Programs fix themselves! Today! It's scary!

SF Reading for Computer Scientists: Summer 2015
From BLOG@CACM

SF Reading for Computer Scientists: Summer 2015

Summer reading recommendations for computer scientists, courtesy of the SIGCSE 2015 Using Science Fiction in CS Courses BOF.

The Ethics of Cyberwar
From BLOG@CACM

The Ethics of Cyberwar

Under what conditions should one engage in cyberwar? How should such a conflict be waged?

From Russia, Without Love
From BLOG@CACM

From Russia, Without Love

Considering Russia's alleged involvement in international cyber incidents, and its willingness to stop them.

Computer Security and the Risks of Online Voting
From BLOG@CACM

Computer Security and the Risks of Online Voting

An election in Australia is the latest instance of discovering a security flaw in an online voting system, while it is being used.

The Three Faces of Cyberwar
From BLOG@CACM

The Three Faces of Cyberwar

The different aspects of cyberwar, and what can be done about them.

 Yet Another Major Data Breach, But Will This Time Be Any Different?
From BLOG@CACM

Yet Another Major Data Breach, But Will This Time Be Any Different?

Why is our community having such an anemic response to all of these major data breaches? What can we do differently? What should we be doing differently?

Run-Time Assertions: What Are You Waiting For?
From BLOG@CACM

Run-Time Assertions: What Are You Waiting For?

Would Design by Contract have avoided Heartbleed?

Those Who Say Code Does Not Matter
From BLOG@CACM

Those Who Say Code Does Not Matter

Often, you will be told programming languages do not matter much. It is a pretty general rule that people arguing language does not matter are simply trying...

Through A Google Glass, Darkly
From BLOG@CACM

Through A Google Glass, Darkly

I have been wearing Google Glass as both a technical assessment of utility and as a social study in human dynamics and expectations.

Privacy and Google Glass
From BLOG@CACM

Privacy and Google Glass

Why has there been so much negative sentiment about Google Glass in the press regarding privacy? This article looks at privacy from two different perspectives,...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo