This message was sent to ##Email##
|
October 29, 2019 |
| | | |
|
|
IAPSC
If you are an IAPSC member, you should have received a survey link in your email. Our goal in conducting this survey is to gather the information that will help us enhance your membership's value and make decisions on locations for future conferences.
This survey will close TODAY, October 29, at 5 pm EDT. Members who complete the survey in its entirety will we entered into a random drawing to win a $100 Amazon gift card. While you must provide your name and email address to be eligible for the drawing, only the survey administrator has access to that information. All answers remain anonymous to the board. The winner will be notified and announced in the November 12, 2019 newsletter. If you have any questions, please reach out to us at iapsc@iapsc.org
.
IAPSC
Earning the Certified Security Consultant designation demonstrates your depth of knowledge, professional objectivity, integrity, and skills as a security consultant. The CSC requires a combination of experience, education, independence, ethics, and successfully passing an online examination. The exam is open to both members and non-members as well as independent (external) and internal consultants. IAPSC members are pre-qualified to sit for the exam and receive a discount on the certification fee. Learn more here and apply today!
|
ONVIF conformant products allow you to create a flexible, cost-effective and future-proof system. ONVIF enables you to choose optimal products from different vendors. The
conformant products allow you to be confident in their interoperability and makes integration of products from different vendors easier.
Read more
|
|
|
|
|
Reach Your Prospects Every Week
Thousands of industry professionals subscribe to association news briefs, which allows your company to push messaging directly to their inboxes and take advantage of the association's brand affinity.
Connect with Highly Defined Buyers and Maximize Your Brand Exposure
|
|
|
|
|
EfficientGov
According to a recent survey from the Public Technology Institute, only 35% of the local government IT departments surveyed have adopted a strategic plan for preemptively addressing cybersecurity concerns. And, perhaps even more disconcertingly, only 27% have developed an incident response plan to help guide staff through what at this point can only be considered the next inevitable attack.
READ MORE
Brica
The group behind Emotet malware is getting smarter and smarter in the way the deliver such a Malware. While the infection schema looks alike from years; the way the group tries to infect victims improves from day to day.
READ MORE
ZDNet
Security researchers have discovered a new piece of Mac malware; however, some of its purpose and full features will remain a mystery for a little longer.
Named Tarmac (OSX/Tarmac), this new malware was distributed to macOS users via online malvertising (malicious ads) campaigns.
READ MORE
Threat Post
Researchers have found new ways that bad actors can exploit Alexa and Google Home smart speakers to spy on users. This time the hack not only includes eavesdroping, but also includes voice-phishing, or using people’s voice cues to determine passwords.
READ MORE
CISA
In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he or she may be able to piece together enough information to infiltrate an organization's network. If an attacker is not able to gather enough information from one source, he or she may contact another source within the same organization and rely on the information from the first source to add to his or her credibility.
READ MORE
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|