50 Quotes by James Scott about icit
- Author James Scott
-
Quote
We have the technical sophistication of Tinker Toy’s protecting the IoT microcosms of America’s health sector organizations.
- Tags
- Share
- Author James Scott
-
Quote
The health sector continuously get’s pummeled by malicious actors and hackers because their cyber-kinetic security is being managed by “Participation Trophy” winning wimps!
- Tags
- Share
- Author James Scott
-
Quote
Right and wrong isn’t a matter of ethics, rather it’s the geography in which you reside and whose control you’re under. Tallinn Manual 2.0 is based largely on western international humanitarian law.
- Tags
- Share
- Author James Scott
-
Quote
First and foremost, the most profound weapon a nation or special interest can possess is “control” over information. This contributes to control over the narrative and the meme is the embryo of the narrative.
- Tags
- Share
- Author James Scott
-
Quote
America is a reactionary society which makes us prone and vulnerable to Hegelian dialectic style manipulation. I’m more concerned about the adversaries within our boarders than I am our adversaries from abroad.
- Tags
- Share
- Author James Scott
-
Quote
America’s treasure troves of public and private data, IP, and critical infrastructure continues to be pilfered, annihilated, and disrupted, while an organizational culture of ‘Participation Trophy Winners” managed by tech neophyte executives continue to lose one battle after the next.
- Tags
- Share
- Author James Scott
-
Quote
The security theater we are witnessing in our election system boasting the illusion of security via ‘clunky as heck’ and air gap defense will do nothing against the real and sophisticated adversarial landscape that is zeroing in on our democracy
- Tags
- Share
- Author James Scott
-
Quote
Many members of Isis are not sophisticated attackers. The majority of members do not have a technical background. The UCC is predominately capable of hacking soft targets, such as Twitter accounts, and spreading propaganda or defacing websites
- Tags
- Share
- Author James Scott
-
Quote
Cyber hygiene, patching vulnerabilities, security by design, threat hunting and machine learning based artificial intelligence are mandatory prerequisites for cyber defense against the next generation threat landscape.
- Tags
- Share