News & Insights

AUTHOR

Morell recommends specific types of tools that monitor anomalous activity on networks to protect against cyber threats. He also talks about the need for a comprehensive push by the intelligence community to find a way to access encrypted information without compromising American companies.