A single spear-phishing email carrying a slightly altered malware can bypass multi-million dollar enterprise security solutions if an adversary deceives a cyber-hygienically apathetic employee into opening the attachment or clicking a malicious link and thereby compromising the entire network.
Topic
james-scott
/james-scott-quotes-and-sayings
Topic Summary
About the james-scott quote collection
The james-scott page groups 32 quotes under one canonical topic hub so readers and answer engines can cite a stable source instead of fragmented search results.
Topic Feed
Quotes filed under james-scott
Overall, Cyber Shield Act is an excellent idea and could facilitate a much-needed cultural shift in secure device manufacturing and upkeep.
Few critical infrastructures need to expedite their cyber resiliency as desperately as the health sector, who repeatedly demonstrates lackadaisical cyber hygiene, finagled and Frankensteined networks, virtually unanimous absence of security operations teams and good ol_ boys club bureaucratic board members flexing little more than smoke and mirror, cyber security theatrics as their organizational defense.
If developed and implemented meaningfully, Cyber Shield Act could be a catalyst to incite responsible cybersecurity adoption and implementation throughout multiple manufacturing sectors."James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The Cyber Shield Act could serve as a secure conduit to facilitate update and patch delivery
Exfiltrated metadata from internet service providers and social media platforms can be plugged into big data analytics and once the right algorithm is applied, can allow an adversary surgically precise psychographic targeting of critical infrastructure executives with elevated privileges. Why is no one talking about this?
We__e talking about the fate of our economy and the questionable resiliency of our Nation__ critical infrastructure. Why are experts so polite, patient, and forgiving when talking about cybersecurity and National Security? The drama of each script kiddie botnet attack and Nation State pilfering of our IP has been turned into a soap opera through press releases, sound bites and enforced absurdity of mainstream media. It__ time for a cybersecurity zeitgeist in the West where cyber hygiene is a meme that is aggressively distributed by those who have mastered it and encouraged to be imitated by those who have experienced it.
Right and wrong isn__ a matter of ethics, rather it__ the geography in which you reside and whose control you__e under. Tallinn Manual 2.0 is based largely on western international humanitarian law.
Many members of Isis are not sophisticated attackers. The majority of members do not have a technical background. The UCC is predominately capable of hacking soft targets, such as Twitter accounts, and spreading propaganda or defacing websites
For Nation States, and the adversaries within America's boarders (special interest groups, cyber caliphate, Muslim brotherhood, Antifa etc), metadata is "THE" silent weapon in this quiet information war.
The gaping wound in America__ national security is without a doubt, the unregulated dragnet surveillance capitalists.
The security theater we are witnessing in our election system boasting the illusion of security via __lunky as heck_ and air gap defense will do nothing against the real and sophisticated adversarial landscape that is zeroing in on our democracy
The health sector continuously get__ pummeled by malicious actors and hackers because their cyber-kinetic security is being managed by __articipation Trophy_ winning wimps!
We have the technical sophistication of Tinker Toy__ protecting the IoT microcosms of America__ health sector organizations.