Posts Tagged: Security

Privacy News Highlights – Feb 13 – 28

Privacy News Highlights 13–28 February 2010 Contents: EU – Legality of Fingerprint Database to be Tested in Netherlands Court 3 CA – Alberta Retailer Ordered to Stop Credit Checks. 3 CA – Privacy Commissioner Cites Sobeys for Collecting Personal Info. 3 CA – Saskatchewan Privacy Boss Decries Denial of New Staff 4 CA – CommissionersRead… Read more »

Meet Sam: a Cleared Job Fair job seeker with an active security clearance seeking new career opportunities

Meet Sam. Sam is a security cleared job seeker living in Northern Viginia who has attended numerous job fairs beyond our own in the past 15 months. When we met him at our past Cleared Job Fair on January 21, 2010 at the Westin Dulles, Sam was one of the very first job seekers toRead… Read more »

OPM: Veterans’ Recruitment and Employment Strategic Plan

The Office of Personnel Management released the first strategic plan last month to increase the hiring of Veterans in the Federal Government. Below is a summary of the main points outlined in the strategic plan. First, some Veteran hiring facts: – Federal Government is the Nation’s leading employer of Veterans. – Veterans make up moreRead… Read more »

HOW to unlock programs, financials, databases, etc without passcodes/ passwords/user names???

Historically, usernames and passwords are the most common form of authenticating computer users. They are also both the worst management headache for IT staff and the biggest network security hole in existence. Many help desks handle more password related calls than any other category. Users routinely share their passwords with one another. We have passwordsRead… Read more »

Gov’t Privacy News Summary – Jan 23 -31

My friend Fred puts together this awesome privacy news highlights and said I could cross-post… So here we go: Privacy News Highlights 23–31 January 2010 Contents: US – NH House Passes Bill Banning Fingerprint IDs. 3 CA – B.C. Names Acting Privacy Commissioner 3 CA – Privacy Commissioner Launches New Facebook Probe. 3 CA –Read… Read more »

Key Areas to Consider in Open Government Strategy and Planning

The release of the Open Government Directive on December 8, 2009 has prompted many Agencies to wrestle with what a comprehensive Open Government Plan for their Agency would look like. According to the Directive, Open Government Plans are due for each Agency in 120 days. (The Sunlight foundation provides a good high level summary ofRead… Read more »

How-To: Create Strong Passwords and Foil Hackers in 6 Easy Steps

Author’s note: this is a guide to help you better protect yourself and your privacy online. While no method is full-proof, these steps will point you in the right direction and I encourage everyone to work towards a safer, more secure New Year in 2010. Creating strong passwords is not enough when you consider justRead… Read more »

Best Recruiters 2009 in the Security Cleared Marketplace Announced

“Best Recruiters of 2009” Announced ClearedJobs.Net releases 2009’s list of recruiter honorees selected by Security Cleared Job Fair Attendees throughout the year (December 2, 2009) Falls Church, Virginia — During each of the Cleared Job Fairs held throughout 2009, participating security cleared job seekers were given the opportunity to vote for the nation’s top recruitingRead… Read more »

Facebook and Twitter Can Endanger Your Security Clearance Health

On the Homeland Security Watch blog earlier today, an article was reposted concerning the use of popular social networking tools and their possible endangering of a professional’s security clearance. Here is my response: Yes, professionals with security clearances have many concerns when it comes to maintaining their clearances. These are professionals who we have entrustedRead… Read more »

Tips To Choose The Web Application Security Testing Tool

With vital data being transmitted and stored in web applications, there is a dire need for explicit security testing. Apart from maintaining the privacy of important data, security testing also involves tackling authorization and authentication issues. As a tester, it is the most exciting form of testing. There are many interesting tools and techniques toRead… Read more »