This message contains images. If you don't see images, click here to view. Advertise in this news brief.
|

|
|
|
Complete IAPSC Conference schedule — now available!
IAPSC
The IAPSC Annual Conference on April 27-30 in New Orleans has been built to provide you with the tools and knowledge to not only keep you at the forefront of the security industry, but to run your business(es) for maximum profitability. Focusing on four specific tracks, Building the Business, Practice Management, Forensics & Physical Security, and Technical, sessions cover a range of topics including: keys to becoming an expert witness, expanding your reach through teaming on projects, using technology to increase business efficiency, as well as advanced crime forecasting and risk analysis. View the complete conference program here.
Members — vote now!
IAPSC
IAPSC is accepting member votes for the IAPSC Board of Directors election and proposed amendment to the IAPSC Bylaws through April 12. If you will not be present for the live election during the Annual Members Business Meeting on April 29 in New Orleans, please log in to your member account at www.iapsc.org and visit the Members' Library to download the proxy ballots and more information.
Tomographic detection by G.I. Forstater
IAPSC
What exactly is tomographic detection? Tomography is actually a solution to the problem of super imposition of structures when taking slices in X-ray, radio frequency or in our discussion, using Wi-Fi in the gigahertz range. Super imposition is when you get layer upon layer of things you really don't want to see.
'CSI' IT: Forensic security skills for IT professionals
Computer Weekly
TV shows such as "CSI" have popularized the world of digital forensics, glamorizing the field and piquing the interest of a generation of graduates and career-movers writes Kevin Waugh.
Because of this, it would be natural to assume that most businesses could now call on an extensive pool of talented experts in the forensics field capable of investigating technical security issues, such as the source of internal intellectual property leaks, or the theft of sales books by ex-employees moving to rival companies.
The reality is somewhat different.
6 ways the 'Internet of Things' will transform enterprise security
Computerworld
Most enterprise security organizations are unlikely to have a spamming refrigerator on top of their list of things to worry about. But news earlier this year that an Internet-connected fridge was co-opted into a botnet that sent spam to tens of thousands of Internet users is sure to have piqued the interest of at least a few.
If nothing, the incident showed how even a benign consumer appliance could pose a danger to enterprises if connected to the Internet without proper security protections.
Want to get published?
MultiBriefs
In an effort to enhance the overall content of IAPSC News, we'd like to include peer-written articles in future editions. As a member of IAPSC, your knowledge of the industry lends itself to unprecedented expertise. And we're hoping you'll share this expertise with your peers through well-written commentary. Because of the digital format, there's no word or graphical limit, and our group of talented editors can help with final edits. If you're interested in participating, please contact Ronnie Richard to discuss logistics.
A lesson in social espionage: How to dissect a competitor's social strategy
Search Engine Watch
Competitive intelligence is incredibly important for analyzing and tracking your competitors, whether it's in SEO, PPC or social media.
The following exercises, using only public data, only scratched the surface of the analysis and insights that are possible to glean from this data. It shows how much you can learn about an industry, a company or a competitor by carefully dissecting their social activity.
Labor Law: Is your workplace safe?
Work it, Richmond
Karen Michael, an attorney specializing in practical work law solutions, writes: "The most recent workplace violence incident that occurred at Ft. Hood will cause employers to once again question whether this type of thing could happen at their workplaces. I can expect calls from clients, as I have in the past after events like this, asking me what they need to do to make their workplaces 100 percent safe. The reality is, no one can guarantee a 100 percent safe workplace, regardless of what processes or training the employer implements. However, I can offer tips to mitigate the chances and be ready if it happens."
Repeat after me: Model your security threats 1st
InfoWorld
Organizations often deploy defenses before they know which attacks will nail them. A new book helps security professionals model those threats and design defenses.
18 must-have paid tools for PPC success
Search Engine Watch
In enterprise PPC, or for tougher tasks like landing page optimization, paid tools are necessary to make an impact — and they usually pay for themselves many times over in improved results.
Remember, most paid tools offer free trials, so there's little risk in testing them out. Here are 18 must-have paid tools for PPC success, suggested by eight PPC experts.
Tesla Model S security system vulnerable to outside hacking
The Daily Caller
A security researcher has discovered a way to locate, hack and unlock Tesla Motors premiere Model S from a remote computer using traditional hacking techniques.
Nitesh Dhanjani announced his findings at the Black Hat Asia security conference in Singapore recently, where the author of multiple books on hacking revealed that by cracking a six-character password transmitted wirelessly over the Internet, a hacker could locate and gain access to any Model S.
Missed last week's issue? See which articles your colleagues read most.
|
| |
|
|
IAPSC News
Colby Horton, Vice President of Publishing, 469.420.2601 Download media kit
Ashley Whipple, Senior Content Editor, 469.420.2642 Contribute news
International Association of Professional Security Consultants
575 Market Street, Suite 2125, San Francisco, CA 94105
Tel: 415-536-0288 | Fax: 415-764-4915
iapsc@iapsc.org | www.iapsc.org
Be sure to add us to your address book or safe sender list so our emails get to your inbox. Learn how.
This edition of the IAPSC News was sent to ##Email##. To unsubscribe, click here. Did someone forward this edition to you? Subscribe here — it's free!
|
|
Recent issues
March 25, 2014
March 12, 2014
Feb. 11, 2014
Jan. 14, 2014
|
|
|
|
|
7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|