acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
datePast Year
subjectSecurity
authorR. Colin Johnson
Commissioned by CACM Staff
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Confidential Computing Conquers Hacks
From ACM News

Confidential Computing Conquers Hacks

Protecting data while it is in use, rather than at rest or in flight.

Post-Quantum Cryptography: Protecting Today from Tomorrow
From ACM News

Post-Quantum Cryptography: Protecting Today from Tomorrow

Crafting more difficult algorithms to protect secrets so they are resilient to future quantum computers is creating, in effect, post-quantum cryptography.

Dialing the Trust Level Down to Zero
From ACM News

Dialing the Trust Level Down to Zero

With cybersecurity under increasing attacks, experts say we should move to the Zero Trust Architecture. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account