Blog Post Taxpayer Information Keeps Ending Up In the Wrong Hands. What Can IRS Do To Better Protect It?
Blog Post After a Recent Hacking—What are the Risks and Rewards of Cloud Computing Use by the Federal Government?
Blog Post Our Testimony to Congress on Efforts to Secure Oil and Gas Pipelines Against Cyberattacks (video)