acm-header
Sign In

Communications of the ACM

Careers


Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorThe Wall Street Journal
Featured Job
bg-corner

Who Wins in a Data Breach? Cybersecurity Firms–and Their Investors
From ACM Careers

Who Wins in a Data Breach? Cybersecurity Firms–and Their Investors

FireEye Inc., a Silicon Valley-based cybersecurity firm, held an analyst day on Wednesday, doing its best (as all companies do) to build its case for the Street...

In Nato Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia
From ACM News

In Nato Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia

Somewhere near Iceland, a new NATO member, Berlya is under cyber-attack, most likely launched from its arch-rival Crimsonia, although the Berlyans can’t be completely...

Security Professionals Stymied By Outdated Visualization Tools
From ACM Careers

Security Professionals Stymied By Outdated Visualization Tools

Earlier this year, the film Blackhat got high marks for realistic scenes in which hackers and information security specialists work at their computers to hunt down...

Complex, Legacy Code Creates Security Headaches for Microsoft Users
From ACM Careers

Complex, Legacy Code Creates Security Headaches for Microsoft Users

Some of the biggest hacking episodes of the last few years, from Target Corp. to Home Depot Inc., share a common thread. Microsoft Corp. platforms were involved...

Cybercriminals Are Misappropriating Businesses' Web Addresses
From ACM News

Cybercriminals Are Misappropriating Businesses' Web Addresses

Cybercriminals targeting businesses are stealing more than customer passwords and credit-card numbers these days.

White House Names Nation's First Chief Data Scientist
From ACM Careers

White House Names Nation's First Chief Data Scientist

Taking a page from Silicon Valley's playbook, the White House said on Wednesday it had appointed the nation's first chief data scientist.

Google Sweetens the Bug Bounty
From ACM Careers

Google Sweetens the Bug Bounty

Google's security team has a problem.

As Cyber Threats Soar, So Do Ciso Salaries
From ACM Careers

As Cyber Threats Soar, So Do Ciso Salaries

The search for chief information security officers has become a seller’s market as companies rush to hire security experts in the wake of several high-profile cyberattacks...

What Is Tor? Did Police Outfox It?
From ACM News

What Is Tor? Did Police Outfox It?

European police Friday said they had figured out how to pierce an Internet privacy tool used by dissidents, journalists and online drug dealers.

Nsa Director Offers Olive Branch in Silicon Valley Speech
From ACM Careers

Nsa Director Offers Olive Branch in Silicon Valley Speech

The director of the National Security Agency said Monday that he understands why Silicon Valley companies have beefed up security to keep out government agencies...

10 Innovations For the Bank of the Future
From ACM Careers

10 Innovations For the Bank of the Future

Around 100 of the U.K.s finest minds in the financial technology sector gathered Tuesday for the Financial News and WSJD inaugural Fintech Conference in London.

New York City Shuts Down Unauthorized Sensors
From ACM Careers

New York City Shuts Down Unauthorized Sensors

With little fanfare, urban areas have become overgrown by a tangle of sensors: cameras unobtrusively snapping pictures at traffic lights, microphones secretly triangulating...

Is Encrypted Messaging Entering the Mainstream?
From ACM Careers

Is Encrypted Messaging Entering the Mainstream?

As people grow more aware of government and criminal surveillance of their mobile devices and computers, a flurry of companies have recently launched products they...

There's No Flying in Drone School
From ACM Careers

There's No Flying in Drone School

Welcome to drone school.

How to ­se Tech Like a Teenager
From ACM Opinion

How to ­se Tech Like a Teenager

Enough with complaining that young people these days are addicted to their phones. The question you should be asking is: What do they know that you don't?

Paper Planes Transform Into Tiny Drones
From ACM News

Paper Planes Transform Into Tiny Drones

It took Chuck Pell less than a minute to build his drone.

Belgium Desperately Seeking Cybersecurity Czar
From ACM Careers

Belgium Desperately Seeking Cybersecurity Czar

At the tail end of a bruising 2013, Belgium's government decided it had had enough.

Man Behind the First Computer Password: It's Become a Nightmare
From ACM Opinion

Man Behind the First Computer Password: It's Become a Nightmare

In the early 1960s, Fernando Corbató helped deploy the first known computer password.

It's Judgment Day For Killer Robots at the ­nited Nations
From ACM News

It's Judgment Day For Killer Robots at the ­nited Nations

Has the age of the Robocop and Terminator arrived?

The Plug-and-Play Luxury Home
From ACM News

The Plug-and-Play Luxury Home

When it is completed in early 2018, Muse, a 49-story luxury-condo development in Sunny Isles Beach, Fla., will have an automated parking system with push-button...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account