The best way to guard against becoming a target of social engineering is to familiarize yourself with the strategies, psychological hooks, and technological means...Alex Vakulov From BLOG@CACM | August 21, 2023 at 03:34 PM
Automated testing in software development significantly diminishes routine work and saves time, allowing programmers to work more effectively.
Yegor Bugayenko From BLOG@CACM | August 4, 2023 at 11:09 PM
The importance of information security technologies cannot be overstated, given how deeply integrated gadgets have become in our lives.
Alex Vakulov From BLOG@CACM | May 31, 2023 at 11:26 AM
With the advent of Large Language Models (LLMs) and tools like GitHub CoPilot, I think we’re a step closer towards a world where software can be created by anyone...Jason Hong From BLOG@CACM | February 17, 2023 at 03:11 PM
A discussion of the most common phone scams, how they work, and how to protect yourself from them.
Alex Tray From BLOG@CACM | January 24, 2023 at 03:24 PM
These practices help technical professionals ensure their organizations' data is protected and can be recovered quickly.
Alex Tray From BLOG@CACM | January 3, 2023 at 10:14 AM
A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.
Alex Vakulov From BLOG@CACM | October 18, 2022 at 12:58 PM
Conflicts and disputes can arise between these adjacent teams; it is impossible to avoid them in the process of launching new products. And they certainly require...Alex Vakulov From BLOG@CACM | August 29, 2022 at 11:09 AM
A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.
Alex Vakulov From BLOG@CACM | August 10, 2022 at 01:24 PM
The purpose of this blog post is to present an anonymization method that can be applied to the digital attributes of personal data.
Alina Alemaskina and Andrei Sukhov From BLOG@CACM | February 16, 2022 at 12:29 PM
In comic books, most superheroes have a secret identity, usually to protect their friends and family from retribution. However, today’s computer technology would...Jason Hong From BLOG@CACM | January 24, 2022 at 09:12 AM
What are key ideas and intuitions foundational to AI that AI education in secondary schools should target? This blog post describes our approach to teaching AI...Shuchi Grover and Brian Broll From BLOG@CACM | November 23, 2021 at 04:16 PM