acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

A History of One Brute-Force Attack
From BLOG@CACM

A History of One Brute-Force Attack

A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.

Data Anonymization Using the Random Sum Method
From BLOG@CACM

Data Anonymization Using the Random Sum Method

The purpose of this blog post is to present an anonymization method that can be applied to the digital attributes of personal data.

Blockchain For What, Exactly?
From BLOG@CACM

Blockchain For What, Exactly?

Considering the real-world consequences of blockchain hype.

Superhero Secret Identities Aren't Possible with Today's Computing Technologies
From BLOG@CACM

Superhero Secret Identities Aren't Possible with Today's Computing Technologies

In comic books, most superheroes have a secret identity, usually to protect their friends and family from retribution. However, today’s computer technology would...

AI Education for Teens: Lifting the Hood on Data and Machine Learning
From BLOG@CACM

AI Education for Teens: Lifting the Hood on Data and Machine Learning

What are key ideas and intuitions foundational to AI that AI education in secondary schools should target? This blog post describes our approach to teaching AI...

Safe AI in Education Needs You
From BLOG@CACM

Safe AI in Education Needs You

Artificial intelligence is coming to your learners and will raise challenging issues that need experts like you. Learn how you can get involved in AI and Educational...

Protecting Enterprise Use of IoT
From BLOG@CACM

Protecting Enterprise Use of IoT

How to strengthen the security of the Internet of Things in organizations.

From U-boats to 'U-bots'
From BLOG@CACM

From U-boats to 'U-bots'

Considering the outlook for undersea cyberwar.

Auditing AI and Autonomous Systems; Building an Infrastructure of Trust
From BLOG@CACM

Auditing AI and Autonomous Systems; Building an Infrastructure of Trust

How do we build trust? How can we systematically assure trust in our systems? How would auditing AI and autonomous systems contribute to this goal? Explaining...

From Solar Sunrise to SolarWinds
From BLOG@CACM

From Solar Sunrise to SolarWinds

The hack of critical departments of the U.S. government—and of many leading corporations—should come as no surprise.

Closing the 'Trust Gap' in Contact Tracing/Exposure Notification Technology
From BLOG@CACM

Closing the 'Trust Gap' in Contact Tracing/Exposure Notification Technology

The digitization of contact tracing presents an array of challenges.

Voting, Coding, and the Code
From BLOG@CACM

Voting, Coding, and the Code

Voting is more than counting.

In (Virtual) Defense of Democracy
From BLOG@CACM

In (Virtual) Defense of Democracy

There are two ways to proceed with political discourse in cyberspace, if the trolls are to be tamed.

Governance and Oversight Coming to AI and Automation: Independent Audit of AI Systems
From BLOG@CACM

Governance and Oversight Coming to AI and Automation: Independent Audit of AI Systems

Independent Audit of AI Systems is the next evolution of governance for artificial intelligence and automation.

From 007 to 'Agent 111'
From BLOG@CACM

From 007 to 'Agent 111'

James Bond-like spies have been eclipsed by a new generation of operatives who don't travel the world (not physically, anyway) or drink martinis, shaken or stirred...

What Went Wrong? Facebook and 'Sharing' Data with Cambridge Analytica
From BLOG@CACM

What Went Wrong? Facebook and 'Sharing' Data with Cambridge Analytica

The road to the Cambridge Analytica/Facebook scandal is strewn with failures.

Securing Threats to Election Systems
From BLOG@CACM

Securing Threats to Election Systems

Election systems are supposed to be disconnected from the Internet, for obvious and sensible reasons. Most elections today, however, use computers.

On the Ethics of Cyberwar
From BLOG@CACM

On the Ethics of Cyberwar

Keith Abney of the Ethics + Emerging Sciences group of California Polytechnic State University surveys the moral landscape of cyberwar.

Toward Oversight, and More Debate, of Cyber Weaponry
From BLOG@CACM

Toward Oversight, and More Debate, of Cyber Weaponry

Policies and strategies that may lead to or initiate acts of cyberwar should be subject to scrutiny. 

Cyber Insecurity and Cyber Libertarianism
From BLOG@CACM

Cyber Insecurity and Cyber Libertarianism

Here we are, 70 years into the computer age and we still do not seem to know how to build secure information systems. And yet, our community marches forward with...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account