Authors:
  • This will include the various methods of internal monitoring, attack and penetration, investigation of suspected hackers or rogue employees - and you have plenty of rogue employees - and identity protection for government employees. The review team will also remain current on the constantly evolving new methods of attack and will attempt to anticipate them and develop defenses as often as possible before breaches occur.

    "CNN Newsroom" with Carol Costello, www.cnn.com. October 3, 2016.
Cite this Page: Citation