Senior Fellow Quotes

Quotes tagged as "senior-fellow" Showing 1-12 of 12
“In this business, I find more value in working with hackers who abstract new realities from cast aside code and concepts than academics who regurgitate other people’s work and try to pawn it off as their own.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“This cyberwar will be a continuous marathon war that will only compound and hyper-evolve in stealth, sophistication and easy entry due to the accelerated evolution of “as a service” attack strategies for sale on the dark web.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“Wannacry is the Stuxnet of Ransomware”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“The biggest center of attention needs to be the Secretaries of State. They're the ones that manage the elections. At the end of the day, they're the ones that need to be held accountable.”
James Scott, co-founder, Institute for Critical Infrastructure Technology

“The two main problems with signature and heuristic based anti-virus is the mutating hash and the fact that you first need a victim in order to obtain the signature."
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“Cyber hygiene has to memetically pounded into the intellectual DNA of the American population and continuously
reinforced by peer pressure.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“The cyber industry is riddled with faux experts and self-proclaimed scholars, Tallinn Manual 2.0 is a perfect example of what happens when cyber-upstarts try to proclaim authority on a topic they know nothing about.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“Cybersecurity whitepaper authors have it all wrong! It’s about weaponizing the mind of the reader so that when they’re done reading the document, you’ve memetically drilled home actionable concepts that will expediently impact their cyber defense.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“Ransomware is not only about weaponizing encryption, its more about bridging the fractures in the mind with a weaponized message that demands a response from the victim.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“Right and wrong isn’t a matter of ethics, rather it’s the geography in which you reside and whose control you’re under. Tallinn Manual 2.0 is based largely on western international humanitarian law.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“America is a reactionary society which makes us prone and vulnerable to Hegelian dialectic style manipulation. I’m more concerned about the adversaries within our boarders than I am our adversaries from abroad.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“We have the technical sophistication of Tinker Toy’s protecting the IoT microcosms of America’s health sector organizations.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology