Goodreads helps you follow your favorite authors. Be the first to learn about new releases!
Start by following James Scott, Senior Fellow, Institute for Critical Infrastructure Technology.

James Scott, Senior Fellow, Institute for Critical Infrastructure Technology James Scott, Senior Fellow, Institute for Critical Infrastructure Technology > Quotes


James Scott, Senior Fellow, Institute for Critical Infrastructure Technology quotes Showing 1-30 of 74

“Your ideas are bound to forces of which you have no control due to the fact that you've voluntarily submitted your freedom of though to the perception steering censorship of Google, Facebook and other dragnet surveillance capitalists.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“The security theater we are witnessing in our election system boasting the illusion of security via ‘clunky as heck’ and air gap defense will do nothing against the real and sophisticated adversarial landscape that is zeroing in on our democracy”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“In this business, I find more value in working with hackers who abstract new realities from cast aside code and concepts than academics who regurgitate other people’s work and try to pawn it off as their own.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“In this digital age, we're experiencing the weaponization of everything.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“We’re talking about the fate of our economy and the questionable resiliency of our Nation’s critical infrastructure. Why are experts so polite, patient, and forgiving when talking about cybersecurity and National Security? The drama of each script kiddie botnet attack and Nation State pilfering of our IP has been turned into a soap opera through press releases, sound bites and enforced absurdity of mainstream media. It’s time for a cybersecurity zeitgeist in the West where cyber hygiene is a meme that is aggressively distributed by those who have mastered it and encouraged to be imitated by those who have experienced it.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“This next president is going to inherit the most sophisticated and persistent cyber espionage cultures the world has ever seen, He needs to surround himself with experts that can expedite the allocation of potent layers of next generation defenses around our targeted critical infrastructure silos.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“A Nation State or Cyber-Mercenary won’t hack e-voting machines one by one. This takes too long and will have minimal impact. Instead, they’ll take an easier approach like spear phishing the manufacturer with malware and poison the voting machine update pre-election and allow the manufacturer to update each individual machine with a self-deleting payload that will target the tabulation process.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“Cities require connectivity rather than territory in order to drive their economic stability and growth.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“Consider all tabulation systems infected by bad actors until a third party, not affiliated with the manufacturer or election officials, proves they are secure.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“Every conceivable layer of the election process is completely riddled with vulnerabilities, so yes, hacking elections is easy!”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“A single spear-phishing email carrying a slightly altered malware can bypass multi-million dollar enterprise security solutions if an adversary deceives a cyber-hygienically apathetic employee into opening the attachment or clicking a malicious link and thereby compromising the entire network.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“The collaboration between secretaries of state, election officials and the voting system manufacturers on the matter of enforcing this black box proprietary code secrecy with election systems, is nothing less than the commoditization and monetization of American Democracy”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“You think an Air Gap is a defense? Sofacy, Stuxnet, Uroburos, AirHopper, BitWhisperer and ProjectSauron…enough said!”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“If you don’t feel ordained by the Universe to do this job, do something else. The intelligence community has to shut down the gaping wound that is the insider threat epidemic we are experiencing right now.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“You are a product to dragnet surveillance capitalists like Google, Facebook, Comcast and Verizon. Your ideas are rarely your own, rather you are little more than a pawn to their perception steering initiatives to get you to read, believe and buy what they put in front of you. The first step to breaking out of this faux reality matrix is to stop using Google, Bing, Yahoo, Comcast and Facebook.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“The health sector continuously get’s pummeled by malicious actors and hackers because their cyber-kinetic security is being managed by “Participation Trophy” winning wimps!”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“This cyberwar will be a continuous marathon war that will only compound and hyper-evolve in stealth, sophistication and easy entry due to the accelerated evolution of “as a service” attack strategies for sale on the dark web.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“Look at the stealth and sophistication of foreign nation state APTs who break through even the most sophisticated layers of security daily and tell me why they would just give our completely unprotected election systems a pass”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“Exfiltrated metadata from internet service providers and social media platforms can be plugged into big data analytics and once the right algorithm is applied, can allow an adversary surgically precise psychographic targeting of critical infrastructure executives with elevated privileges. Why is no one talking about this?”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“A vulnerability in an organization's IoT microcosm is a "taunt" to exploit by malicious hackers”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“Dragnet surveillance capitalists such as Facebook, Comcast, AT&T and Google, unfortunately, supply these manipulating forces with an endless supply of metadata for this information war against the American and European public.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“Real cybersecurity means that your Security Operations team is consistently pen testing your network with the same stealth and sophistication as the Russian nation state, the same desperation as China’s 13th Five Year Plan, the same inexhaustible energy of the Cyber Caliphate and the same greed and ambition for monetary payoff as a seasoned cyber-criminal gang.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“Hacking a national election is simple. Exploit a vulnerability in the manufacturer's network, poison the tabulation software update with self-deleting malware and let the manufacturer send to their field reps and election consultants who update the election systems.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“You'll have the right to be angry about Vault 7 only after you boycott dragnet surveillance data providers like Google, Microsoft, Skype, Facebook and LinkedIn. The true threat is coming from the private sector surveillance profiteers.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“Wannacry is the Stuxnet of Ransomware”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“In an age of dynamic malware obfuscation through operations such as mutating hash, a hyper-evolving threat landscape, and technologically next generation adversaries, offensive campaigns have an overwhelming advantage over defensive strategies.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“Your organization’s illusion based security theater will lose to the reality of cyber-attack any day of the week.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“Ransomware is not only about weaponizing encryption, its more about bridging the fractures in the mind with a
weaponized message that demands a response from the victim.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“Few critical infrastructures need to expedite their cyber resiliency as desperately as the health sector, who repeatedly demonstrates lackadaisical cyber hygiene, finagled and Frankensteined networks, virtually unanimous absence of security operations teams and good ol’ boys club bureaucratic board members flexing little more than smoke and mirror, cyber security theatrics as their organizational defense.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“In this cyberwar, industry is on their own and must combat nation states, cyber mercenaries, cyber caliphate and other actors via layered security laced with intelligent machines.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

« previous 1 3