Matthew jhon's Quotes Page #2

Here's the list of quotes submitted by Matthew jhon  —  There are currently 46 quotes total — keep up the great work!

Medical devices and EHR systems are notoriously vulnerable to remote compromise

James Scott  Famous Quote

added 7 years ago

The Frankensteined architectonic IoT microcosm of the prototypical critical infrastructure organization renders an infinite attack surface just begging to be exploited.

James Scott  Famous Quote

added 7 years ago

A vulnerability in an organization's IoT microcosm is a taunt to exploit by malicious hackers.

James Scott  Famous Quote

added 7 years ago

Exfiltrated metadata from internet service providers and social media platforms can be plugged into big data analytics and once the right algorithm is applied, can allow an adversary surgically precise psychographic targeting of critical infrastructure executives with elevated privileges. Why is no one talking about this?

James Scott  Famous Quote

added 7 years ago

In this digital age, we're experiencing the weaponization of everything.

James Scott  Famous Quote

added 7 years ago

You can keep the Office of Personnel Management records, I don't need Electronic Health Records, give me the metadata, big data analytics and a custom tailored algorithm and a budget and during election time, I can cut to the psychological core of any population, period!

James Scott  Famous Quote

added 7 years ago

After Congress passed SJ Res 34, we are no longer merely battling a cyber-kinetic war on all fronts, we are now in a state of perpetual cyber-kinetic-meta war, and there will be no end.

James Scott  Famous Quote

added 7 years ago

Cyber warfare is as much about psychological strategy as technical prowess.

James Scott  Famous Quote

added 7 years ago

When flimsy cyber defense fails, Format Preserving Encryption prevails

James Scott  Famous Quote

added 7 years ago

Wannacry is the Stuxnet of Ransomware

James Scott  Famous Quote

added 7 years ago

This cyberwar will be a continuous marathon war that will only compound and hyper-evolve in stealth, sophistication and easy entry due to the accelerated evolution of “as a service” attack strategies for sale on the dark web.

James Scott  Famous Quote

added 7 years ago

James Scott, ICIT, Senior Fellow, Institute for Critical Infrastructure Technology, Cybersecurity , America , Hegelian dialectic style manipulation , society

James Scott  Famous Quote

added 7 years ago

Right and wrong isn’t a matter of ethics, rather it’s the geography in which you reside and whose control you’re under. Tallinn Manual 2.0 is based largely on western international humanitarian law.

James Scott  Famous Quote

added 7 years ago

We have the technical sophistication of Tinker Toy’s protecting the IoT microcosms of America’s health sector organizations.

James Scott  Famous Quote

added 7 years ago

Ransomware is not only about weaponizing encryption, its more about bridging the fractures in the mind with a weaponized message that demands a response from the victim.

James Scott  Famous Quote

added 7 years ago

Your organization’s illusion based security theater will lose to the reality of cyber-attack any day of the week.

James Scott  Famous Quote

added 7 years ago

Cybersecurity whitepaper authors have it all wrong! It’s about weaponizing the mind of the reader so that when they’re done reading the document, you’ve memetically drilled home actionable concepts that will expediently impact their cyber defense.

James Scott  Famous Quote

added 7 years ago

The cyber industry is riddled with faux experts and self-proclaimed scholars, Tallinn Manual 2.0 is a perfect example of what happens when cyber-upstarts try to proclaim authority on a topic they know nothing about.

James Scott  Famous Quote

added 7 years ago

In this business, I find more value in working with hackers who abstract new realities from cast aside code and concepts than academics who regurgitate other people’s work and try to pawn it off as their own.

James Scott  Famous Quote

added 7 years ago

Most IoT devices that lack security by design simply pass the security responsibility to the consumer, thus, treating the customers as techno-crash test dummies. James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

James Scott  Famous Quote

added 7 years ago

The health sector continuously get’s pummeled by malicious actors and hackers because their cyber-kinetic security is being managed by “Participation Trophy” winning wimps!

James Scott, Senior Fellow, Institute for Critical Infrastructure Technology  Famous Quote

added 8 years ago

Many members of Isis are not sophisticated attackers. The majority of members do not have a technical background. The UCC is predominately capable of hacking soft targets, such as Twitter accounts, and spreading propaganda or defacing websites

James Scott, Senior Fellow, Institute for Critical Infrastructure Technology  Famous Quote

added 8 years ago

We need you!

Help us build the largest authors community and quotes collection on the web!

Quiz

Are you a quotes master?

»
Who said: "Let us not seek the Republican answer or the Democratic answer, but the right answer. Let us not seek to fix the blame for the past. Let us accept our own responsibility for the future."?
A Jimmy Carter
B John F. Kennedy
C Lyndon B. Johnson
D Gerald Ford