Ransomware is more about manipulating vulnerabilities in human psychology than the adversary's technological sophistication
Author
James Scott
/james-scott-quotes-and-sayings
Author Summary
About James Scott on QuoteMust
James Scott currently has 46 indexed quotes and 3 linked works on QuoteMust. This page is the canonical destination for that author archive.
Works
Books and titles linked to this author
Quotes
All quote cards for James Scott
We need a cybersecurity renaissance in this Country that promotes cyber hygiene and a security centric corporate culture applied and continuously reinforced by peer pressure
Why all this fear and paranoia around Vault 7 and WikiLeaks? Solve the problem by demanding regulation that centers around Security by Design by technology manufactures, problem solved
Many members of Isis are not sophisticated attackers. The majority of members do not have a technical background. The UCC is predominately capable of hacking soft targets, such as Twitter accounts, and spreading propaganda or defacing websites
For Nation States, and the adversaries within America's boarders (special interest groups, cyber caliphate, Muslim brotherhood, Antifa etc), metadata is "THE" silent weapon in this quiet information war.
America__ treasure troves of public and private data, IP, and critical infrastructure continues to be pilfered, annihilated, and disrupted, while an organizational culture of __articipation Trophy Winners_ managed by tech neophyte executives continue to lose one battle after the next.
The gaping wound in America__ national security is without a doubt, the unregulated dragnet surveillance capitalists.
The security theater we are witnessing in our election system boasting the illusion of security via __lunky as heck_ and air gap defense will do nothing against the real and sophisticated adversarial landscape that is zeroing in on our democracy
The health sector continuously get__ pummeled by malicious actors and hackers because their cyber-kinetic security is being managed by __articipation Trophy_ winning wimps!
We have the technical sophistication of Tinker Toy__ protecting the IoT microcosms of America__ health sector organizations.