Cybersecurity
Security-Cleared professionals in cybersecurity.
Online Dating Sites, Sextortion, and Your Clearance
Online dating sites are a popular way for people to search out and meet others for dating and socializing. As is usually the case, there are also those who exploit the originally intended use of the sites for more nefarious purposes. Scammers use legitimate dating sites to make contact with
Cyber Vetting and the Career Risks of Online Sabotage
One of the more popular articles we’ve published at ClearanceJobs.com is ‘How to Prevent a Vindictive Ex From Tanking Your Security Clearance.’ It did so well, we turned it into a popular YouTube video, as well. I don’t want to speculate as to the marriages of the average clearance holder,
Use (or Misuse) of IT Systems – What Clearance Applicants and Holders Should Know
The Cold War days of spies using microfilms, dead drops, and disappearing ink are long gone. Now they use cell phones, laptop computers, and remotely injected malware to steal information. As evidenced by stories about hackers and IT security breaches in the news every day, IT technology is a major
OPM Inserts IT Security Incident Clause into Investigations Contracts
In quite the ironic twist, the Office of Personnel Management (OPM) has updated all of their contracts with background investigation service providers by inserting or replacing previous clause that address information security incident reporting requirements. A news story posted by NextGov outlined some of the new requirements inserted into OPM