acm-header
Sign In

Communications of the ACM

BLOG@CACM


Refine your search:
dateMore Than a Year Ago
subjectPerformance And Reliability
authorAlex Vakulov
bg-corner

Beyond Passwords: The Path to Stronger Authentication Mechanisms
From BLOG@CACM

Beyond Passwords: The Path to Stronger Authentication Mechanisms

The inherent risks associated with passwords stem from their very nature.

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
From BLOG@CACM

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?

A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.

DevSecOps: Resolving Disagreements Between Developers and Security Teams
From BLOG@CACM

DevSecOps: Resolving Disagreements Between Developers and Security Teams

Conflicts and disputes can arise between these adjacent teams; it is impossible to avoid them in the process of launching new products. And they certainly require...

A History of One Brute-Force Attack
From BLOG@CACM

A History of One Brute-Force Attack

A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account