Posts Tagged: Security

First Time Attendee Gives Reports of the Cleared Job Fair on September 15th

Friends + employer support win over nerves Daisy W. woke up today not wanting to be here with us at our Cleared Job Fair in Arlington, Virginia. Noooo, it wasn’t about us … it was more about her own nerves. “I was really nervous to come here,” says Daisy. Thankfully, however, her buddies (for whomRead… Read more »

140 Characters of Crap: The Sophisticated Rise of Social Engineering on Twitter

Anybody that uses Twitter on a regular basis know that there are a lot of junk posts and meaningless content. There have even been studies done recently that categorized the type of posts and found that the majority wasn’t very “news worthy” to say the least. Yet there were some meaningful tweets, I have foundRead… Read more »

Robert Lentz to Speak at IA & Cyber Security Seminar in Norfolk, VA – October 15th

Keynote Speaker Robert Lentz, Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance & Chief Information Assurance Officer, U.S. Department of Defense has over 26 years of experience with the National Security Agency (NSA) in areas of financial management and technical program management. He has served as: Chief of the Space and NetworksRead… Read more »

Tell DHS what you think about Homeland Security priorities – Log on this week!

This year marks the first-ever Quadrennial Homeland Security Review (QHSR), a top-to-bottom review of the Department of Homeland Security to assess our nation’s homeland security policies and priorities. Although the review is occurring in Washington, DHS knows that it won’t really be complete unless it includes input from stakeholders across the country, including other federalRead… Read more »

Upcoming Event! Oct 22nd Bootable / Live Media Technical Exchange Meeting (TEM)

Bootable / Live Media Technical Exchange Meeting (TEM) Sponsored by the DISA CTO, Mr. Dave Mihelcic October 22, 2009 MITRE, Building 1 Auditorium McLean, Virginia Many DoD and Intel agencies are looking for ways to reduce the expense of removing attackers from their computer operating systems. In addition they are looking to operating systems thatRead… Read more »

Misuse of IT Systems and Security Clearances

You had to have that latest U2 or Bruce Springsteen album. Maybe it wasn’t offered on iTunes or maybe you didn’t love enough to pay for it. So, you used a P2P Network and downloaded it for free…and now you’re filling out your SF86. Questions? Perhaps the greatest concern, regarding the use of information technologyRead… Read more »

Tired of Hearing About Web 2.0?

I was reading through the blogs on Gov Loop earlier today. A lot of what I saw was “Web 2.0 this” and “Web 2.0 that”. But when I read more, well, it all started to sound the same. We all want our government agencies to actively use it in some way, but there are someRead… Read more »

Help Spread the Word to Homeland Security-ers

The National Academy of Public Administration (my org) is working with DHS to host an online dialogue, and we could use your help in spreading the word. This year marks the inaugural Quadrennial Homeland Security Review (QHSR), and as part of this top-to-bottom review, DHS is asking stakeholders to give them feedback on the missions,Read… Read more »