This message was sent to ##Email##
|
November 26, 2019 |
| | | |
|
|
IAPSC
We will be closing at 3 p.m. on Wednesday, Nov. 27 and remain closed Thursday, Nov. 28, and Friday, Nov. 29 for the Thanksgiving holiday and will resume responding to all requests on Monday, Dec. 2nd. We hope that you are able to enjoy a very relaxing holiday! If you have any questions, please email us at iapsc@iapsc.org.
IAPSC
Earning the Certified Security Consultant designation demonstrates your depth of knowledge, professional objectivity, integrity, and skills as a security consultant. The CSC requires a combination of experience, education, independence, ethics, and successfully passing an online examination. The exam is open to both members and non-members as well as independent (external) and internal consultants. IAPSC members are pre-qualified to sit for the exam and receive a discount on the certification fee. Learn more here and apply today!
|
ONVIF conformant products allow you to create a flexible, cost-effective and future-proof system. ONVIF enables you to choose optimal products from different vendors. The
conformant products allow you to be confident in their interoperability and makes integration of products from different vendors easier.
Read more
|
|
|
|
|
Reach Your Prospects Every Week
Thousands of industry professionals subscribe to association news briefs, which allows your company to push messaging directly to their inboxes and take advantage of the association's brand affinity.
Connect with Highly Defined Buyers and Maximize Your Brand Exposure
|
|
|
|
|
ASIS
The rapid growth and variety of career opportunities within the security industry make for a highly competitive market. To set oneself apart, security management professionals must demonstrate credibility, expertise, and a commitment to professional growth. The best way to achieve this?
ASIS International Board Certification, recognized globally as the gold standard in security management excellence.
READ MORE
CISA
Recently, the Cybersecurity and Infrastructure Security Agency (CISA) released its Cyber Essentials, a starting point for small businesses and government agencies to understand and address cybersecurity risk as they do other risks. Developed in collaboration with small businesses and state and local governments, Cyber Essentials aims to equip smaller organizations that historically have not been a part of the national dialogue on cybersecurity with basic steps and resources to improve their cybersecurity. Cyber Essentials includes two parts – guiding principles for leaders to develop a culture of security, and specific actions for leaders and their IT professionals to put that culture into action.
READ MORE
Bleeping Computer
Tech support scammers are actively exploiting a Firefox browser lock (browlock) bug to persuade potential victims to call their fake Windows support line within 5 minutes to avoid having their systems disabled.
The bug allows the crooks to lock the targets' browser, preventing them from closing the browser tab displaying the tech support scam page.
READ MORE
ZDNet
An unconventional form of ransomwareis being deployed in targeted attacks against enterprise servers – and it appears to have links to some of the most notorious cyber-criminal groups around. The previously undetected server-encrypting malware has been detailed in research by cybersecurity analysts at Intezer and IBM X-Force, who've named it PureLocker because it's written in the PureBasic programming language.
READ MORE
Dark Reading
2019 likely will break a record for the most data breaches and exposed records ever, according to a new report.
There were 5,183 data breaches reported with 7.9 billion records exposed in just the first nine months of this year, according to Risk Based Security, which tracks publicly reported breaches. That's an increase of 33.3% in breaches and 112% in total records over the same period in 2018.
Some 3.1 billion of the exposed records came from six breaches between July 1 and Sept. 30, the report found.
READ MORE
Infosec Resources
Most of us have received a malicious email at some point in time, but phishing is no longer restricted to only a few platforms. The evolution of technology has given cybercriminals the opportunity to expand their criminal array and orchestrate more sophisticated attacks through various channels.
READ MORE
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|