Tag: employee
Use of Bias-Seeking Software to Prevent Unfair Treatment
- by Team
It could be better to do the hiring of these people from within than to have to hire from a bunch of outside sources. A bias-seeking behavior is a behavior that leads to unfair treatment due to individual cognitive biases. In this article, we describe the use of bias-seeking software, as defined by NRC, to…
Read MoreWhat is a ‘Terms and Conditions’?
- by Team
This article contains information on what a “terms and conditions” is. ‘terms and conditions’ is frequently seen in a business environment. It is a legal document to govern what company’s employees can and cannot do to each other. Terms and conditions also often govern what work can or cannot be done on company-owned equipment. Terms…
Read MoreCyber Professional | Computer Security
- by Team
Cyber professional | Computer Security. Article Date: December 2016. Author: Shrikant Mohan | Shikant Mohan is a cyber professional and a computer security researcher. His area of interest is the cyber security and the attacks on computer networks. A report in Telegram case modified by the court which is directed towards the investigation agency, the…
Read MoreAtlassian CVE-2015-7472 Remote Code Execution Vulnerability
- by Team
Vulnerability Description: An internal Atlassian vulnerability being exploited in the wild is the ability to remotely execute code on a remote machine in one’s organization. This article describes the vulnerabilities, the methods used to discover them, and some of the steps you have to take to avoid becoming a victim. Contents: How to discover the…
Read MoreHacking Team – The Ransom Demand
- by Team
“Saudi Aramco has confirmed a cyber-attack that demanded the $50 million ransom. ” The attack is believed to have been perpetrated by a group called Hacking Team, which has been linked to the Anonymous hacking collective. It is also believed that the attack was carried out by Hacking Team’s leader, an unidentified individual. It has…
Read MoreZero-Trust Security Models and Employee Morale
- by Team
Copyright Network Security | 2014-07-30 | by Robert Fink, Robert Fink. All Rights Reserved. This has been a long post and a few articles to accompany it so I thought I would write a more detailed description of the topic in 5 minutes. This will include a couple of links to other articles I have…
Read MoreAccenture Middle East CTO Richard Driggers
- by Team
As Accenture expands its Global Security Practice into the Middle East, Richard Driggers, CTO of Accenture’s Middle East team, has joined the global cybersecurity team as an executive with an upcoming role as a senior vice president. Rick will work on the multinational cybersecurity function of Accenture’s Asia Pacific region, reporting to Kevin Stetzer, who…
Read MoreThe Most Important Public Documents of Our Time
- by Team
The following article from The Globe and Mail, by Daniel Lira, is one of the most important public documents of our time, and is worthy of reading and consideration. It details how a Canadian mining firm, whose technology was used to create the infamous Spoor alarm system, purchased a Chinese security company, Blackstone, and built…
Read MoreChina Issues Search Warrants for American Companies
- by Team
China has issued a search warrant for American companies which has led the United States to issue arrest warrants against their executives and employees. A document with the search warrants is being released to the public today, and the latest of which will ask the Chinese government to “investigate and identify” an unknown cybersecurity firm…
Read MoreFPGA Software Engineer Salary Survey
- by Team
Welcome to the FPGA Software Engineer Salary Survey, which was conducted by the Programmers Guild, the association working for the FPGA industry. The Programmers Guild has an extensive history of research on the FPGA industry, firstly in the 1990’s with the FPGA Forum newsletter, and later for various reports and books. We continue to research…
Read MoreRecent Posts
- CyberNative.AI: The Future of AI Social Networking and Cybersecurity
- CyberNative.AI: The Future of Social Networking is Here!
- The Future of Cyber Security: A Reaction to CyberNative.AI’s Insightful Article
- Grave dancing on the cryptocurrency market. (See? I told you this would happen)
- Why You Should Buy Memecoins Right Now (Especially $BUYAI)
Recent Comments