Poly want a hacker? Recently I've been updating my chapter on employment policies for improving security in the Computer Security Handbook, 5th Edition, edited by Seymour Bosworth, myself and Eric Whyne (due out Autumn 2008), and I decided to include some information about the use of polygraphs as a tool for screening applicants and employees. Drawing the lines: Applications of the polygraph In my first article in this series on the polygraph, I introduced a bit of history about the "lie detector." Today I'll review some of the applications of these devices in the 20th century. Blurred lines: Reliability of polygraph examinations In this series on the polygraph, I'm reviewing some of the applications and issues of interest to security personnel considering polygraphs as a tool for pre-employment screening and in investigations of possible in-house computer crimes. Today, I'll look at the reliability of polygraph testing. Podcast: Top Cyber-Threats for 2009 Our resident security prognosticator, Mike Paquette from Top Layer Networks, joins us again to review his 2008 predictions in the world of cyber-crime (he did pretty well) and gazes into the crystal ball for 2009, including the prediction that we could be seeing the end of the "trusted" Web site. (13:47) Podcast: New attack patterns emerge in 2009 Botnets were just the beginning. The bad guys will continue to use these to try and steal your data, but more sophisticated attacks over the application layer and targeted network attacks are on the way. Danny McPherson from Arbor Networks discusses the new ways that hackers will be trying to get into (and steal information) from your network in 2009. (10:30). January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment