Advertisement

News

Email Insecurity

Aides or staffers registered official email addresses and passwords on vulnerable third-party sites, putting those credentials at risk.

News

Security via AI

Cybersecurity vendors are using AI-enabled products to keep a leg up on hackers and "threat actors" who have also added AI to their arsenals.

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More