acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

5 Best Practices for Cloud-Based Backup and Recovery in 2023
From BLOG@CACM

5 Best Practices for Cloud-Based Backup and Recovery in 2023

These practices help technical professionals ensure their organizations' data is protected and can be recovered quickly.

The Key to Successful Threat Intelligence
From BLOG@CACM

The Key to Successful Threat Intelligence

A modern Information Security perspective.

Data Backup and VM Modernization: How-to Guide
From BLOG@CACM

Data Backup and VM Modernization: How-to Guide

A guide to VM modernization when dealing with data backups.

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
From BLOG@CACM

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?

A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.

DevSecOps: Resolving Disagreements Between Developers and Security Teams
From BLOG@CACM

DevSecOps: Resolving Disagreements Between Developers and Security Teams

Conflicts and disputes can arise between these adjacent teams; it is impossible to avoid them in the process of launching new products. And they certainly require...

A History of One Brute-Force Attack
From BLOG@CACM

A History of One Brute-Force Attack

A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.

Data Anonymization Using the Random Sum Method
From BLOG@CACM

Data Anonymization Using the Random Sum Method

The purpose of this blog post is to present an anonymization method that can be applied to the digital attributes of personal data.

Blockchain For What, Exactly?
From BLOG@CACM

Blockchain For What, Exactly?

Considering the real-world consequences of blockchain hype.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account