Electronic consciousness and the transhuman revolution renders infinite possibilities for the future as man merges with machines. This is an exhilarating time to be alive!
Author
James Scott
/james-scott-quotes-and-sayings
Author Summary
About James Scott on QuoteMust
James Scott currently has 46 indexed quotes and 3 linked works on QuoteMust. This page is the canonical destination for that author archive.
Works
Books and titles linked to this author
Quotes
All quote cards for James Scott
America is a reactionary society which makes us prone and vulnerable to Hegelian dialectic style manipulation. I__ more concerned about the adversaries within our boarders than I am our adversaries from abroad.
I see the impossible work being done by of my friends at the federal agencies, the Pentagon, NATO, Five Eyes and the intelligence community. They are doing the impossible, for the ungrateful and with a fraction of the budgets required to render a viable defense.
Cyber hygiene, patching vulnerabilities, security by design, threat hunting and machine learning based artificial intelligence are mandatory prerequisites for cyber defense against the next generation threat landscape.
We__e gone from a planet ruled by natural geography to political geography to kinetically functional geography to a cyber geography that is ruled by ideological variation rather than politically constructed boarders.
The way to stifle China__ growth is to inhibit the flow of their connectivity. In order to slow down Chinese expansion, we need to cripple their cyber-kinetic-political connectivity. Indirect polarization, in all forms, must be at the forefront of the agenda when conducting influence operations on all things China.
This cyberwar will be a continuous marathon war that will only compound and hyper-evolve in stealth, sophistication and easy entry due to the accelerated evolution of __s a service_ attack strategies for sale on the dark web.
After Congress passed SJ Res 34, we are no longer merely battling a cyber-kinetic war on all fronts, we are now in a state of perpetual cyber-kinetic-meta war, and there will be no end.
This next president is going to inherit the most sophisticated and persistent cyber espionage cultures the world has ever seen, He needs to surround himself with experts that can expedite the allocation of potent layers of next generation defenses around our targeted critical infrastructure silos.
Overall, Cyber Shield Act is an excellent idea and could facilitate a much-needed cultural shift in secure device manufacturing and upkeep."James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Most IoT devices that lack security by design simply pass the security responsibility to the consumer, thus, treating the customers as techno-crash test dummies.James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
In this cyberwar, industry is on their own and must combat nation states, cyber mercenaries, cyber caliphate and other actors via layered security laced with intelligent machines.
Real cybersecurity means that your Security Operations team is consistently pen testing your network with the same stealth and sophistication as the Russian nation state, the same desperation as China__ 13th Five Year Plan, the same inexhaustible energy of the Cyber Caliphate and the same greed and ambition for monetary payoff as a seasoned cyber-criminal gang.
In an age of dynamic malware obfuscation through operations such as mutating hash, a hyper-evolving threat landscape, and technologically next generation adversaries, offensive campaigns have an overwhelming advantage over defensive strategies.
I don__ care how secure you think your organization is, I__l social engineer my way inside in less than 24 hours regardless of the sophistication of your IoT microcosm security. Whatever obstacles I run into exploiting your technical vulnerabilities will be made up for by exploiting the vulnerabilities in the cyber hygiene of your staff.
The Cyber Shield Act could serve as a secure conduit to facilitate update and patch delivery"James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
You'll have the right to be angry about Vault 7 only after you boycott dragnet surveillance data providers like Google, Microsoft, Skype, Facebook and LinkedIn. The true threat is coming from the private sector surveillance profiteers.
There's a compounding and unraveling chaos that is perpetually in motion in the Dark Web's toxic underbelly.