Communications of the ACM Security The latest news, opinion and research in security, from Communications online.
- Protecting LLMs from Jailbreaksby Jennifer Goforth Gregory on June 18, 2025 at 8:33 pm
Jailbroken LLMs behave in ways that go against their training.
- The Real, Significant Threat of Shadow AIby Esther Shein on June 17, 2025 at 3:40 pm
Unsanctioned AI tools are a growing risk for organizations, especially those in highly regulated industries where security, compliance, and data integrity are critical.
- Turning Servers Against the Cloudby David Geer on June 12, 2025 at 5:18 pm
Attacks targeting internal metadata APIs let systems access information about settings and resources in the cloud, including network addresses and URLs.
- AI and Trustby Bruce Schneier on June 12, 2025 at 2:55 pm
Integrity will be the primary security challenge for AI systems of the next decade.
- Supply Chain Resilience Is More Important than Everby Alex Williams on June 10, 2025 at 7:22 pm
Cascading relationships that place vendors, partners, and cloud providers into one another’s ecosystems make resilience an essential element of every node.
- Beyond the Checkbox: Upgrading the Right to Opt Outby Sebastian Zimmeck on June 10, 2025 at 2:10 pm
How to make the right to opt out work for everyone.
- Homomorphic Technologies Could Process Still-Encrypted Databy Mark Halper on June 4, 2025 at 2:44 pm
Fully homomorphic encryption could stave off the security threats quantum computers pose to current encryption techniques.
- Deleting X: Why SIGDOC Left the Platformby Morgan C. Banville on May 30, 2025 at 2:32 pm
The platform does not embrace communication design, privacy, and trust, the group’s members say.
- Is AI Security Work Best Done In Academia or Industry? Part 2by Saurabh Bagchi on May 27, 2025 at 3:45 pm
Academia benefits from the flow of fresh talent, a pristine stream that is seemingly magically, continually replenished.
- Malicious AI Models Undermine Software Supply-Chain Securityby Aditya K. Sood on May 27, 2025 at 2:46 pm
Trusted repositories, cryptographic validation, and controlled access can help organizations mitigate risks associated with malicious AI models.