Security by design is a mandatory prerequisite to securing the IoT macrocosm, the Dyn attack was just a practice run James Scott More Quotes by James Scott More Quotes From James Scott A hero knows it takes hard work and a long time to get published; a fool thinks it should happen immediately, because he thinks heÕs a hero already. James Scott hard-work hero writing Great ideas are fish in a stream. Your pen/pencil is a spear. If you don't spear them, they'll swim on by. Be ready. James Scott streams swim ideas [Rumors are a] vehicle for anxieties and aspirations that may not be openly expressed. James Scott rumor anxiety may Secrets are inherently selfish. The longer you keep them, the harder it is to put yourself in other people's shoes about them and the more irrational your thinking surrounding it becomes. James Scott selfish shoes thinking I'm a really anxious person, so I tend not to keep secrets. I tend not to even want to hear them. It's too nerve-wracking for me to try and keep things from people. James Scott secret trying people Secrets can be poisonous. James Scott poisonous secret I certainly very much enjoy acting, but I am open to anything really. I think it's important when you have those moments in life when you are not attached to something, and you are not quite sure what the next phase of your journey is going to look like, that you don't pigeon-hole yourself. James Scott acting journey thinking The more people you run into, the greater your exposure, the easier it is to understand and empathize with other people. So if you are living in a much smaller ecosystem, it's probably easier to have simpler feelings. James Scott ecosystems running people I can remember the time I would get my scripts and spent the entire weekend breaking them down and playing with them, and putting a lot of work into them, trying to bring the character to life, and to make interesting choices. It was one of the things to me that told me that I needed to change things up a little bit, because to me, I felt the passion was lacking from some of my performances. James Scott weekend passion character I certainly am not afraid of hard work. Hard work is only hard if you are not passionate about what you are doing. James Scott not-afraid passionate hard-work It's always fun to try something new, and to play a new character, and it's fun to play another period. James Scott play fun character As your life goes on you should gain a deeper understanding of the world and the people moving through it; but that might be asking too much. James Scott understanding people moving No matter how old you are, if you're just not an empathetic person, it's a lot easier to concentrate solely on something that is injuring another person to even some score. Hopefully as people grow older, their ability to empathize deepens. James Scott score matter people Revenge is a really narrow scope through which to view things. In the same way secrets do, it has this ability to warp everything. But secrets are more inward, and revenge is outward. James Scott revenge secret views Secrets are always never as well kept as people think they are. More often than not when you reveal something, especially the bigger it is, people always had some inkling, or they're like, "Well, yeah, of course." James Scott secret people thinking The sad thing is that often when you expose your secrets and become more honest with yourself, you find the reaction from the outside world is more complicated than the intense guilt you yourself have inflicted. James Scott guilt secret world Among state sponsored hacking groups, Russian APT’s approach hacking our critical infrastructure as if they are playing chess; strategically, methodically and with a concentrated focus. James Scott This next president is going to inherit the most sophisticated and persistent cyber espionage cultures the world has ever seen, He needs to surround himself with experts that can expedite the allocation of potent layers of next generation defenses around our targeted critical infrastructure silos. James Scott A Nation State or Cyber-Mercenary won’t hack e-voting machines one by one. This takes too long and will have minimal impact. Instead, they’ll take an easier approach like spear phishing the manufacturer with malware and poison the voting machine update pre-election and allow the manufacturer to update each individual machine with a self-deleting payload that will target the tabulation process. James Scott America’s treasure troves of public and private data, IP, and critical infrastructure continues to be pilfered, annihilated, and disrupted, while an organizational culture of ‘Participation Trophy Winners” managed by tech neophyte executives continue to lose one battle after the next. James Scott