Mandating insecurity by requiring government access to all data and communications.
Peter G. Neumann
Far-Sighted Thinking About Deleterious Computer-Related Events
Considerably more anticipation is needed for what might seriously go wrong.
Risks and Myths of Cloud Computing and Cloud Storage
Considering existing and new types of risks inherent in cloud services.
My previous column, "The Foresight Saga, Redux," began a discussion that is continued here regarding some lessons learned from the 2012 U.S. November…
Inside Risks: U.S. Election After-Math
Recounting problems still associated with election integrity, transparency, and accountability.
Risks of Neglecting Infrastructure
The September 2006 column ("The Foresight Saga") discussed failures in critical infrastructures due to lack of foresight in backup and recovery facilities. This…
Reflections on Computer-Related Risks
Tracing the history of exposing and elucidating the wide variety of system problems and associated social implications of uses and misuses of computing technology.
Internal Surveillance, External Risks
Building surveillance technologies into communications networks is risky. Two years ago, Greece discovered that legally installed surveillance software in a cell phone…
Toward a Safer and More Secure Cyberspace
Readers of this column are familiar with descriptions of cybersecurity threats and potentially dire consequences, particularly as more critical activities become…
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved