“Exfiltrated metadata from internet service providers and social media platforms can be plugged into big data analytics and once the right algorithm is applied, can allow an adversary surgically precise psychographic targeting of critical infrastructure executives with elevated privileges. Why is no one talking about this?”


James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Read more quotes from James Scott, Senior Fellow, Institute for Critical Infrastructure Technology


Share this quote:
Twitter icon

Friends Who Liked This Quote


To see what your friends thought of this quote, please sign up!

0 likes
All Members Who Liked This Quote

None yet!



Browse By Tag