Security-Cleared professionals in cybersecurity.
Online dating sites are a popular way for people to search out and meet others for dating and socializing. As is usually the case, there are also those who exploit the originally intended use of the sites for more nefarious purposes. Scammers use legitimate dating sites to make contact with
One of the more popular articles we’ve published at ClearanceJobs.com is ‘How to Prevent a Vindictive Ex From Tanking Your Security Clearance.’ It did so well, we turned it into a popular YouTube video, as well. I don’t want to speculate as to the marriages of the average clearance holder,
The Cold War days of spies using microfilms, dead drops, and disappearing ink are long gone. Now they use cell phones, laptop computers, and remotely injected malware to steal information. As evidenced by stories about hackers and IT security breaches in the news every day, IT technology is a major
In quite the ironic twist, the Office of Personnel Management (OPM) has updated all of their contracts with background investigation service providers by inserting or replacing previous clause that address information security incident reporting requirements. A news story posted by NextGov outlined some of the new requirements inserted into OPM