acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

All Photos are Fake Until Proven Real
From BLOG@CACM

All Photos are Fake Until Proven Real

The blurred lines of photographic reality in the AI Era.

The Life-or-Death Importance of Medical Device Security
From BLOG@CACM

The Life-or-Death Importance of Medical Device Security

Cybersecurity was not always top of mind when these devices were being created.

Duped No More: Navigating the Maze of Social Engineering Schemes
From BLOG@CACM

Duped No More: Navigating the Maze of Social Engineering Schemes

The best way to guard against becoming a target of social engineering is to familiarize yourself with the strategies, psychological hooks, and technological means...

Automated Tests Are the Safety Net
From BLOG@CACM

Automated Tests Are the Safety Net

Automated testing in software development significantly diminishes routine work and saves time, allowing programmers to work more effectively.

Navigating the 2023 Cybersecurity Landscape
From BLOG@CACM

Navigating the 2023 Cybersecurity Landscape

The importance of information security technologies cannot be overstated, given how deeply integrated gadgets have become in our lives.

Beyond Passwords: The Path to Stronger Authentication Mechanisms
From BLOG@CACM

Beyond Passwords: The Path to Stronger Authentication Mechanisms

The inherent risks associated with passwords stem from their very nature.

A Year Embedded in the Crypto-NFT Space
From BLOG@CACM

A Year Embedded in the Crypto-NFT Space

From digital ownership to artistic communities.

Cybersecurity Mistakes to Avoid at All Costs
From BLOG@CACM

Cybersecurity Mistakes to Avoid at All Costs

Preventing unauthorized access or misuse of confidential data.

Using GitHub CoPilot is Like Having a Superpower
From BLOG@CACM

Using GitHub CoPilot is Like Having a Superpower

With the advent of Large Language Models (LLMs) and tools like GitHub CoPilot, I think we’re a step closer towards a world where software can be created by anyone...

What Google Should Really Be Worried About
From BLOG@CACM

What Google Should Really Be Worried About

How sewers of lies could spell the end of Web search.

Why Data Security Is An Issue For Business Phone Systems In 2023
From BLOG@CACM

Why Data Security Is An Issue For Business Phone Systems In 2023

A discussion of the most common phone scams, how they work, and how to protect yourself from them.

5 Best Practices for Cloud-Based Backup and Recovery in 2023
From BLOG@CACM

5 Best Practices for Cloud-Based Backup and Recovery in 2023

These practices help technical professionals ensure their organizations' data is protected and can be recovered quickly.

The Key to Successful Threat Intelligence
From BLOG@CACM

The Key to Successful Threat Intelligence

A modern Information Security perspective.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account