The sad thing is that often when you expose your secrets and become more honest with yourself, you find the reaction from the outside world is more complicated than the intense guilt you yourself have inflicted. James Scott More Quotes by James Scott More Quotes From James Scott Cyber hygiene, patching vulnerabilities, security by design, threat hunting and machine learning based artificial intelligence are mandatory prerequisites for cyber defense against the next generation threat landscape. James Scott Cyber warfare is as much about psychological strategy as technical prowess. James Scott Cybersecurity whitepaper authors have it all wrong! It’s about weaponizing the mind of the reader so that when they’re done reading the document, you’ve memetically drilled home actionable concepts that will expediently impact their cyber defense. James Scott Cyborgification is simply the process of compensating technologically for the inherent limitations of natural man. James Scott Dragnet surveillance capitalists such as Facebook, Comcast, AT&T and Google, unfortunately, supply these manipulating forces with an endless supply of metadata for this information war against the American and European public. James Scott Electronic consciousness and the transhuman revolution renders infinite possibilities for the future as man merges with machines. This is an exhilarating time to be alive! James Scott Exfiltrated metadata from internet service providers and social media platforms can be plugged into big data analytics and once the right algorithm is applied, can allow an adversary surgically precise psychographic targeting of critical infrastructure executives with elevated privileges. Why is no one talking about this? James Scott Few critical infrastructures need to expedite their cyber resiliency as desperately as the health sector, who repeatedly demonstrates lackadaisical cyber hygiene, finagled and Frankensteined networks, virtually unanimous absence of security operations teams and good ol’ boys club bureaucratic board members flexing little more than smoke and mirror, cyber security theatrics as their organizational defense. James Scott First and foremost, the most profound weapon a nation or special interest can possess is “control” over information. This contributes to control over the narrative and the meme is the embryo of the narrative. James Scott For Nation States, and the adversaries within America's boarders (special interest groups, cyber caliphate, Muslim brotherhood, Antifa etc), metadata is THE silent weapon in this quiet information war. James Scott HCCIC by the C suite at HHS is a profound statement of having the moral courage to do what's right for the health sector James Scott I don’t care how secure you think your organization is, I’ll social engineer my way inside in less than 24 hours regardless of the sophistication of your IoT microcosm security. Whatever obstacles I run into exploiting your technical vulnerabilities will be made up for by exploiting the vulnerabilities in the cyber hygiene of your staff. James Scott I see the impossible work being done by of my friends at the federal agencies, the Pentagon, NATO, Five Eyes and the intelligence community. They are doing the impossible, for the ungrateful and with a fraction of the budgets required to render a viable defense. James Scott If developed and implemented meaningfully, Cyber Shield Act could be a catalyst to incite responsible cybersecurity adoption and implementation throughout multiple manufacturing sectors. James Scott, Senior Fellow, Institute for Critical Infrastructure Technology James Scott If you don’t formulate your own narrative, you become a pawn in someone else’s. James Scott In an age of dynamic malware obfuscation through operations such as mutating hash, a hyper-evolving threat landscape, and technologically next generation adversaries, offensive campaigns have an overwhelming advantage over defensive strategies. James Scott In the United States there is a unique blend of patriotism indoctrination from the pulpit which blends establishment controls into the religious ideology. This way, to question the establishment is to question God, therefore one’s patriotism and salvation is contingent on their submission to the state. James Scott In this business, I find more value in working with hackers who abstract new realities from cast aside code and concepts than academics who regurgitate other people’s work and try to pawn it off as their own. James Scott In this cyberwar, industry is on their own and must combat nation states, cyber mercenaries, cyber caliphate and other actors via layered security laced with intelligent machines. James Scott In this digital age, we're experiencing the weaponization of everything. James Scott