Communications of the ACM

Status:published
Journalist Name:Communications of the ACM
Domain Rating:92
Link Policy:no-link

Cybersecurity experts, including cybersecurity professionals at non-vendor and vendor companies, academics, and sources close to the topic, what are the current pros and cons of zero trust? Please share real-world examples and vendor neutral language.

posted completed
posted5/20/2025
deadline completed
deadline5/29/2025
processing completed
processing
published completed
published9/23/2025

Recently published by Communications of the ACM

  • Looking for High School or College Teaching Gen AI literacy.

    Published on: 9/25/2025

    View details
  • Authors, Consultants or College professors on AI native apps or operating systems

    Published on: 9/24/2025

    View details
  • I need cybersecurity, vulnerability, and threat intelligence experts, and companies hit with these attacks. Security holes—finders, keepers, and big losers ‘It’s mine! I saw it first!’ That’s what you might expect to hear from children fighting over an interesting discovery. Whether lost money, a toy, or something only an adult should have (use your imagination), children will claim the right to keep it, show it off, and maybe even trade it for something. That’s how cybercriminals respond to finding zero-day vulnerabilities—those holes in networks, computers, and software no one else knows, and no one has had a chance to fix. They will keep it to themselves until they plan to use it in an attack, or they will sell it on the dark web. Based on the latest statistics, threat actors had much to celebrate recently regarding zero days. According to a 2025 H1 ForeScout Vedere Labs research report, zero-day exploits increased 46% over the previous 12 months. Questions: Who is responsible for discovering and exploiting these zero-day vulnerabilities? What have been the effects on victim companies and affected users? How quickly have companies responded to these zero days? What significant product lines or technology stacks are affected? How are companies adjusting their vulnerability management and security processes? Are those measures effective?

    Published on: 9/24/2025

    View details
  • Need cybersecurity, vulnerability, and threat intelligence experts, and companies hit with zero day attacks

    Published on: 9/24/2025

    View details
  • Looking for people who have turned to chatbots for emotional support

    Published on: 9/23/2025

    View details

Resources

  • 20 Pitching Tips to Win Media Coverage in 2025

    View details
  • Real Pitches That Landed Coverage on WSJ, Forbes & More…

    View details
  • Top 12 AI Tools For Better Media Pitching

    View details
  • How to Pitch a Journo Request? (A Complete Beginner's Guide)

    View details

Tired of sifting through a mountain of queries?

Stop wasting your time - get an AI assistant that sends you only the most relevant media opportunities.