Bennie Thompson said...

Our networks and databases cannot be protected by one protocol, one sophisticated procedure, or one magic arrow.

Context

Thompson discusses the complexity of cybersecurity protection.

06/23/2015

https://congress.gov...