121 Quotes by James Scott
- Author James Scott
-
Quote
A single spear-phishing email carrying a slightly altered malware can bypass multi-million dollar enterprise security solutions if an adversary deceives a cyber-hygienically apathetic employee into opening the attachment or clicking a malicious link and thereby compromising the entire network.
- Tags
- Share
- Author James Scott
-
Quote
In an age of dynamic malware obfuscation through operations such as mutating hash, a hyper-evolving threat landscape, and technologically next generation adversaries, offensive campaigns have an overwhelming advantage over defensive strategies.
- Tags
- Share
- Author James Scott
-
Quote
Few critical infrastructures need to expedite their cyber resiliency as desperately as the health sector, who repeatedly demonstrates lackadaisical cyber hygiene, finagled and Frankensteined networks, virtually unanimous absence of security operations teams and good ol’ boys club bureaucratic board members flexing little more than smoke and mirror, cyber security theatrics as their organizational defense.
- Tags
- Share
- Author James Scott
-
Quote
In this cyberwar, industry is on their own and must combat nation states, cyber mercenaries, cyber caliphate and other actors via layered security laced with intelligent machines.
- Tags
- Share
- Author James Scott
-
Quote
There's a compounding and unraveling chaos that is perpetually in motion in the Dark Web's toxic underbelly.
- Tags
- Share
- Author James Scott
-
Quote
Why all this fear and paranoia around Vault 7 and WikiLeaks? Solve the problem by demanding regulation that centers around Security by Design by technology manufactures, problem solved
- Tags
- Share
- Author James Scott
-
Quote
Overall, Cyber Shield Act is an excellent idea and could facilitate a much-needed cultural shift in secure device manufacturing and upkeep."James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
- Tags
- Share
- Author James Scott
-
Quote
Most IoT devices that lack security by design simply pass the security responsibility to the consumer, thus, treating the customers as techno-crash test dummies.James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
- Tags
- Share
- Author James Scott
-
Quote
The two main problems with signature and heuristic based anti-virus is the mutating hash and the fact that you first need a victim in order to obtain the signature."James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
- Tags
- Share