121 Quotes by James Scott
- Author James Scott
-
Quote
When flimsy cyber defense fails, Format Preserving Encryption prevails
- Tags
- Share
- Author James Scott
-
Quote
As we’ve already seen with exfiltrated voter registration databases and the endless methods of poisoning manufacturer updates, manipulating DRE and optical scan machines and bypassing air gap defense, the state election official’s illusion of security is being pummeled by the reality of cyberattack.
- Tags
- Share
- Author James Scott
-
Quote
Hacking a national election is simple. Exploit a vulnerability in the manufacturer's network, poison the tabulation software update with self-deleting malware and let the manufacturer send to their field reps and election consultants who update the election systems.
- Tags
- Share
- Author James Scott
-
Quote
Look at the stealth and sophistication of foreign nation state APTs who break through even the most sophisticated layers of security daily and tell me why they would just give our completely unprotected election systems a pass
- Tags
- Share
- Author James Scott
-
Quote
We’ve gone from a planet ruled by natural geography to political geography to kinetically functional geography to a cyber geography that is ruled by ideological variation rather than politically constructed boarders.
- Tags
- Share
- Author James Scott
-
Quote
In the United States there is a unique blend of patriotism indoctrination from the pulpit which blends establishment controls into the religious ideology. This way, to question the establishment is to question God, therefore one’s patriotism and salvation is contingent on their submission to the state.
- Tags
- Share
- Author James Scott
-
Quote
Cities require connectivity rather than territory in order to drive their economic stability and growth.
- Tags
- Share
- Author James Scott
-
Quote
In this digital age, we're experiencing the weaponization of everything.
- Tags
- Share
- Author James Scott
-
Quote
This cyberwar will be a continuous marathon war that will only compound and hyper-evolve in stealth, sophistication and easy entry due to the accelerated evolution of “as a service” attack strategies for sale on the dark web.
- Tags
- Share