This message contains images. If you don't see images, click here to view.
Advertise in this news brief.




Text Version   RSS   Subscribe   Unsubscribe   Archive   Media Kit May 20, 2014

Home   About   Join   Members   Events & News   Press   Contact     

 



IAPSC 2014 Conference resources now available
IAPSC
An online photo album from the IAPSC Annual Conference in New Orleans is now available!

View the photo album

Download the conference program




Download presentations from the Members' Library:
   Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article




IAPSC publishes updated best practice: Forensic methodology
IAPSC
The latest version of the best practice document, including a minor edit/caveat, is now available for IAPSC members in the Members' Library. Click here for access.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE




Frank Pisciotta achieves IP video certification
IAPSC
IPVM certified professionals pass rigorous college level courses in advanced security technologies and concepts, requiring participation in a series of live online classes, discussions, exam and essays. Launched in 2012, over 200+ professionals have gained IPVM certifications. Courses are held throughout the year. Those who achieve this certification should be congratulated as the average attendee studied ~150 hours for the class and only 41 percent of attendees pass.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


SPONSORED CONTENT


How to handle counterespionage
Kevin D. Murray, IAPSC Member
You know everything about managing facilities, but a request from management to debug your building can throw even the most seasoned FM for a loop. With the help of an outside professional, you can ensure speech privacy and business security.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Smartphone spyware and eavesdropping thwarted by SpyWarn 2.0
Kevin D. Murray, IAPSC Member
Business espionage, personal spying and government snooping are pandemic facts of 21st century life. Cellphones are the top technical targets. Most "spyware detection" apps only scan for known spyware. New and well hidden spyware goes unnoticed, and detecting baseband eavesdropping isn't even offered.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Justice is fast-tracking cyber hires
Nextgov
The Justice Department is recruiting cyber professionals under special rules to fill vacancies more quickly now that funding constraints have eased somewhat, the department's top network security official said. While the severity of hacks is increasing, civilian agencies still struggle to bring capable computer programmers on staff.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Retailers launch cybercrime info sharing center
The Associated Press via SecurityInfoWatch
Some of the nation's largest retailers are banding together in hopes of protecting consumers' personal and financial information from hackers and thieves. The Retail Industry Leaders Association, along with several top retailers ranging from Gap Inc. to Walgreen Co., launched an intelligence sharing center focused on the prevention of cybercrimes against retailers.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Chinese military unit charged with cyber-espionage against US firms
The Washington Post
The Justice Department charged members of the Chinese military with conducting economic cyber-espionage against American companies, marking the first time that the United States has leveled such criminal charges against a foreign country. Industries targeted by the alleged cyberspying ranged from nuclear to steel to solar energy, officials said. In some cases, they said, the hacking by a military unit in Shanghai was conducted for no other reason than to give a competitive advantage to Chinese companies, including state-owned enterprises.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


More than 100 people nabbed in global hacker crackdown
CNN
Computer hacker forums lit up last week as FBI agents and police in 17 countries began knocking on doors, seizing computers and making arrests. On the popular websites where cybercriminals buy and sell software kits and help each other solve problems, hackers issued warnings about police visits to their homes. The hackers quickly guessed that a major crackdown was underway on users of the malicious software known as Blackshades.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Report: Average US business fields 10,000 security alerts a day
Techworld via CIO
The average North American enterprise fields around 10,000 alerts each day from its security systems, far more than their IT teams can possibly process, a Damballa analysis of Q1 2014 traffic has found. Culled from an analysis of large amounts of ISP and mobile traffic plus the firm's own customers, Damballa calculated that the noisiest networks of all generated an overwhelming 150,000 alerts.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Security chief sees US cyber legislation this summer
Reuters
Congress is likely to agree on cybersecurity legislation this summer, U.S. Homeland Security Secretary Jeh Johnson said, citing growing consensus among lawmakers on the need to help industry share data with government about attacks on computer networks. Lawmakers have been considering legislation to clarify how private companies should be required to disclose security breaches and cyber threats, but spats over liability and privacy protections have repeatedly thwarted comprehensive cybersecurity bills.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


New algorithm revolutionizes cryptography
Homeland Security News Wire
Researchers have solved one aspect of the discrete logarithm problem. This is considered to be one of the "holy grails" of algorithmic number theory, on which the security of many cryptographic systems used today is based. They have devised a new algorithm which calls into question the security of one variant of this problem, which has been closely studied since 1976.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Study: Cloud security improving, but still a work in progress
Forbes
Comfort levels with cloud are rising, and more and more organizations are transferring sensitive or confidential information to public cloud services — even though more than a third expect a negative impact on security posture. In response, the use of encryption is increasing, but more than half of respondents still admit their sensitive data goes unprotected when it is stored in the cloud.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


TRENDING ARTICLES
Missed last week's issue? See which articles your colleagues read most.

    Defending against identity theft in the military (Dark Reading)
Help wanted: 3 ways to minimize new-hire risk (Catherine Iste )
Small businesses growing segment of information security market (Information Management)

Don't be left behind. Click here to see what else you missed.
 



IAPSC News
Colby Horton, Vice President of Publishing, 469.420.2601
Download media kit

Esther Cho, Content Editor, 469.420.2671  
Contribute news

International Association of Professional Security Consultants
575 Market Street, Suite 2125, San Francisco, CA 94105
Tel: 415-536-0288 | Fax: 415-764-4915
iapsc@iapsc.org | www.iapsc.org

Be sure to add us to your address book or safe sender list so our emails get to your inbox. Learn how.

This edition of the IAPSC News was sent to ##Email##. To unsubscribe, click here. Did someone forward this edition to you? Subscribe here — it's free!

Recent issues

May 7, 2014
April 22, 2014
April 8, 2014
March 25, 2014






7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063