From The Washington Examiner:

Among the tools and tactics available to campaigns are two-factor authentication, restricting access to important files so they are not on a shared server, and segmenting networks, said Paul Rosenzweig, a senior fellow at the R Street Institute who works on national security and cybersecurity.

Featured Publications