acm-header
Sign In

Communications of the ACM

Careers


Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorThe Wall Street Journal
Featured Job
bg-corner

Cyber Chiefs Try New Tricks to Attract Talent
From ACM Careers

Cyber Chiefs Try New Tricks to Attract Talent

Cybersecurity and risk executives are using non-traditional means to attract talent, including seeking candidates without degrees or technology backgrounds.

In Facebook's Effort to Fight Fake News, Human Fact-Checkers Struggle to Keep ­p
From ACM Careers

In Facebook's Effort to Fight Fake News, Human Fact-Checkers Struggle to Keep ­p

At Facebook Inc. headquarters in Silicon Valley this week, engineers and researchers huddled around computers in a newly configured "war room" to fight misinformation...

The 15 People Who Keep Wikipedia's Editors From Killing Each Other
From ACM News

The 15 People Who Keep Wikipedia's Editors From Killing Each Other

Wikipedia editors got locked in a dispute several months ago about the biographical summary boxes that sit atop some pages of the online encyclopedia. The tiff...

Next Worry for Facebook: Disenchanted ­sers
From ACM News

Next Worry for Facebook: Disenchanted ­sers

Facebook Inc.'s handling of user data has upset lawmakers and regulators in multiple countries. But the biggest risk to its business could come from angry users...

In Search of Blockchain's Killer-Apps
From ACM Opinion

In Search of Blockchain's Killer-Apps

Blockchain has been in the news lately, but beyond knowing that it has something to do with payments and digital currencies, most people don't know what blockchain...

Hacker-For-Hire Market Is Booming, Says New Report
From ACM Careers

Hacker-For-Hire Market Is Booming, Says New Report

It's becoming cheaper than ever to buy hacking tools online.

Apple Case Highlights Struggles Cios Face in Balancing Privacy, Law Enforcement Requests
From ACM Careers

Apple Case Highlights Struggles Cios Face in Balancing Privacy, Law Enforcement Requests

As technology advances, there's a delicate balance between individual privacy and law enforcement’s requests for information.

Learning to Apply Data Science to Business Problems
From ACM Opinion

Learning to Apply Data Science to Business Problems

One of the most exciting parts of data science is that it can be applied to many domains of knowledge, given our newfound ability to gather valuable data on almost...

It Pays to Be a Privacy Officer
From ACM Careers

It Pays to Be a Privacy Officer

Who's your company's CPO? That's chief privacy officer.

Ftc Appoints an Online Privacy Advocate
From ACM Careers

Ftc Appoints an Online Privacy Advocate

The Federal Trade Commission has appointed a leading Internet privacy and security expert as its new chief technologist, amid a growing concern for consumer protections...

Connecting Your Car to Your Smartphone Can Make Auto Data Work For You
From ACM Careers

Connecting Your Car to Your Smartphone Can Make Auto Data Work For You

If your car could talk, you might be surprised by how much it has to say.

New Email Archive Tool to Sift Literary Legacies
From ACM Careers

New Email Archive Tool to Sift Literary Legacies

The leather-bound diaries of a 19th-century high-school principal in southwestern India are helping change how archivists around the world handle email.

Facebook, a Big User of Apple Machines, Writes and Open Sources Its Own Mac Os Security Software
From ACM Careers

Facebook, a Big User of Apple Machines, Writes and Open Sources Its Own Mac Os Security Software

When Facebook Inc. engineers needed security software to monitor the thousands of Apple Inc. Mac laptops, they couldn't find what they needed.

Data Breaches Boost Funding For Cybersecurity Startups
From ACM Careers

Data Breaches Boost Funding For Cybersecurity Startups

Before Max Krohn, the OkCupid co-founder, played online matchmaker, he had a far-less-romantic interest in cryptography. But he couldn't see a way to make a living...

Moxie Marlinspike: The Coder Who Encrypted Your Texts
From ACM Opinion

Moxie Marlinspike: The Coder Who Encrypted Your Texts

In the past decade, Moxie Marlinspike has squatted on an abandoned island, toured the U.S. by hopping trains, he says, and earned the enmity of government officials...

Vietnam's Mobile Revolution Catapults Millions Into the Digital Age
From ACM Careers

Vietnam's Mobile Revolution Catapults Millions Into the Digital Age

To get an idea of how the mobile Web is catapulting millions of people into the digital age by skipping landline connections, have a look at Vietnam.

U.s. Surveillance Backlash Could Cost Tech Companies More Than $35 Billion By 2016
From ACM Careers

U.s. Surveillance Backlash Could Cost Tech Companies More Than $35 Billion By 2016

The U.S. government's widespread data surveillance practices are likely to cost U.S. cloud computing and other technology companies more money than originally expected...

Who Wins in a Data Breach? Cybersecurity Firms–and Their Investors
From ACM Careers

Who Wins in a Data Breach? Cybersecurity Firms–and Their Investors

FireEye Inc., a Silicon Valley-based cybersecurity firm, held an analyst day on Wednesday, doing its best (as all companies do) to build its case for the Street...

In Nato Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia
From ACM News

In Nato Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia

Somewhere near Iceland, a new NATO member, Berlya is under cyber-attack, most likely launched from its arch-rival Crimsonia, although the Berlyans can’t be completely...

Security Professionals Stymied By Outdated Visualization Tools
From ACM Careers

Security Professionals Stymied By Outdated Visualization Tools

Earlier this year, the film Blackhat got high marks for realistic scenes in which hackers and information security specialists work at their computers to hunt down...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account