Tag: employee

Use of Bias-Seeking Software to Prevent Unfair Treatment

It could be better to do the hiring of these people from within than to have to hire from a bunch of outside sources. A bias-seeking behavior is a behavior that leads to unfair treatment due to individual cognitive biases. In this article, we describe the use of bias-seeking software, as defined by NRC, to…

Read More

What is a ‘Terms and Conditions’?

This article contains information on what a “terms and conditions” is. ‘terms and conditions’ is frequently seen in a business environment. It is a legal document to govern what company’s employees can and cannot do to each other. Terms and conditions also often govern what work can or cannot be done on company-owned equipment. Terms…

Read More

Cyber Professional | Computer Security

Cyber professional | Computer Security. Article Date: December 2016. Author: Shrikant Mohan | Shikant Mohan is a cyber professional and a computer security researcher. His area of interest is the cyber security and the attacks on computer networks. A report in Telegram case modified by the court which is directed towards the investigation agency, the…

Read More

Atlassian CVE-2015-7472 Remote Code Execution Vulnerability

Vulnerability Description: An internal Atlassian vulnerability being exploited in the wild is the ability to remotely execute code on a remote machine in one’s organization. This article describes the vulnerabilities, the methods used to discover them, and some of the steps you have to take to avoid becoming a victim. Contents: How to discover the…

Read More

Hacking Team – The Ransom Demand

“Saudi Aramco has confirmed a cyber-attack that demanded the $50 million ransom. ” The attack is believed to have been perpetrated by a group called Hacking Team, which has been linked to the Anonymous hacking collective. It is also believed that the attack was carried out by Hacking Team’s leader, an unidentified individual. It has…

Read More

Zero-Trust Security Models and Employee Morale

Copyright Network Security | 2014-07-30 | by Robert Fink, Robert Fink. All Rights Reserved. This has been a long post and a few articles to accompany it so I thought I would write a more detailed description of the topic in 5 minutes. This will include a couple of links to other articles I have…

Read More

Accenture Middle East CTO Richard Driggers

As Accenture expands its Global Security Practice into the Middle East, Richard Driggers, CTO of Accenture’s Middle East team, has joined the global cybersecurity team as an executive with an upcoming role as a senior vice president. Rick will work on the multinational cybersecurity function of Accenture’s Asia Pacific region, reporting to Kevin Stetzer, who…

Read More

The Most Important Public Documents of Our Time

The following article from The Globe and Mail, by Daniel Lira, is one of the most important public documents of our time, and is worthy of reading and consideration. It details how a Canadian mining firm, whose technology was used to create the infamous Spoor alarm system, purchased a Chinese security company, Blackstone, and built…

Read More

China Issues Search Warrants for American Companies

China has issued a search warrant for American companies which has led the United States to issue arrest warrants against their executives and employees. A document with the search warrants is being released to the public today, and the latest of which will ask the Chinese government to “investigate and identify” an unknown cybersecurity firm…

Read More

FPGA Software Engineer Salary Survey

Welcome to the FPGA Software Engineer Salary Survey, which was conducted by the Programmers Guild, the association working for the FPGA industry. The Programmers Guild has an extensive history of research on the FPGA industry, firstly in the 1990’s with the FPGA Forum newsletter, and later for various reports and books. We continue to research…

Read More