Infosec Quotes

Quotes tagged as "infosec" Showing 1-14 of 14
“Your ideas are bound to forces of which you have no control due to the fact that you've voluntarily submitted your freedom of though to the perception steering censorship of Google, Facebook and other dragnet surveillance capitalists.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“Cities require connectivity rather than territory in order to drive their economic stability and growth.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“Fewer than one in twenty security professionals has the core competence and the foundation knowledge to take a system all the way from a completely unknown state of security through mapping, vulnerability testing, password cracking, modem testing, vulnerability patching, firewall tuning, instrumentation, virus detection at multiple entry points, and even through back-ups and configuration management.”
Stephen Northcutt, Network Intrusion Detection: An Analysts' Handbook

“If you think you know-it-all about cybersecurity, this discipline was probably ill-explained to you.”
Stephane Nappo

“We’ve gone from a planet ruled by natural geography to political geography to kinetically functional geography to a cyber geography that is ruled by ideological variation rather than politically constructed boarders.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“The way to stifle China’s growth is to inhibit the flow of their connectivity. In order to slow down Chinese expansion, we need to cripple their cyber-kinetic-political connectivity. Indirect polarization, in all forms, must be at the forefront of the agenda when conducting influence operations on all things China.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“Labor automation, machine learning and artificial intelligence will have a devastating impact on the already struggling Chinese economy.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“If we wish to have any hope of beating the bad guys at the cyber game, the good guys must learn to share more effectively and efficiently than them”
Alex Webling

“You may think that Ransomware attack decrypt's the encrypted data after Ransom payment.

Don’t forget the fact that 97% of the attack victims haven’t recovered, even after ransom.”
Arulselvar Thomas - Briskinfosec

“Virtualization, cloud computing, and robust telecommunication provide new capabilities as part of CoOP that can assist organizations in achieving the security, availability, and confidentiality requirements of the new “always on” business model with limited or no interruption even during disruptive events.”
Jeffery Sauntry

“The IoT market grows rapidly and it’s acceleration will continue in all major areas like Industrial Internet of Things; Digital Enterprise; Internet of Healthcare; Internet of Energy; Internet of Education; Digitalisation of global Supply Chains.

Security concerns add to the IoT complexity. Strategically, to assure the system’s reliability & data / knowledge engineering, it is important to insure data integrity, availability, traceability, and privacy. A complex problem of digital transformation globally.

The Internet of Things cybersecurity, therefore, is not a matter of device self-defence. What is needed is a systemic approach. Identify underlying patterns. Secure elements of a chain: from security of a device that creates, captures your data.. to the data storage.. to the back-end storage.. Create/ join IoT ecosystems, driven by protection with external monitoring, detection and reaction systems. It is a challenge - to secure systems.”
Ludmila Morozova-Buss

“Even the bravest cyber defense will experience defeat when weaknesses are neglected.”
Stephane Nappo

“The hacker didn't succeed through sophistication. Rather he poked at obvious places, trying to enter through unlock doors. Persistence, not wizardry, let him through.”
Clifford Stoll, The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

William Gibson
“When Lowbeer wished a conversation in public to be private, which she invariably did, London emptied itself around her.”
William Gibson, Agency