Create an Account
username: password:
 
  MemeStreams Logo

who has the power? | A Noteworthy Year

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
who has the power? | A Noteworthy Year
Topic: Miscellaneous 7:43 am EST, Dec 31, 2014

James Comey:

There are two kinds of big companies in the United States. There are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese.

Josh Bryant:

Some of the biggest companies in the world have security that is only as good as a minimum-wage phone support worker who has the power to reset your account. And they have valid business reasons for giving them this power.

Andrea Peterson and Craig Timberg:

In an era of soaring national investment in cyber-security, the weakest link often involves the inherent fallibility of humans.

Ed Felten:

It's prudent to assume that anything on your phone is potentially at risk.

Barack Obama:

There is a reason why BlackBerrys and iPhones are not allowed in the White House Situation Room.

Dan Kaminsky:

We've migrated so much of our economy to computer networks because they are faster and more efficient, but there are side effects.

Kevin Mandia:

Ninety five percent of networks are compromised in some way.

Jerry Michalski:

Most of the devices exposed on the internet will be vulnerable. They will also be prone to unintended consequences: they will do things nobody designed for beforehand, most of which will be undesirable.

David Sanger:

The recent attacks on the financial firms raise the possibility that the banks may not be up to the job of defending themselves.

FBI:

Cyber threats pose one of the gravest national security dangers to the United States. The FBI stands ready to assist any US company that is the victim of a destructive cyber attack or breach of confidential business information.

Omner Barajas:

There is undeniable evidence that our dependence on interconnected technology is defeating our ability to secure it.

Lillian Ablon, a security researcher at the RAND Corporation:

The ability to attack is certainly outpacing the ability to defend.

Bruce Schneier:

That we live in a world where we aren't sure if any given cyberattack is the work of a foreign government or a couple of guys should be scary to us all.

Michael Riley:

He thought the attack would change everything, that it would force the U.S. to get serious about preparing for a new era of conflict by computer. He was wrong.

Mike Rogers, House Intelligence Committee Chairman:

If anybody in the federal government tells you that they've got this figured out in terms of how to respond to an aggressive cyber attack, then tell me their names, because they shouldn't be there.

AP:

Although the government is projected to spend $65bn on cybersecurity contracts between 2015 and 2020, many experts believe the effort is not enough.

Eric Schmidt and Jared Cohen:

What Lockheed Martin was to the twentieth century, technology and cyber-security companies will be to the twenty-first.



 
 
Powered By Industrial Memetics
RSS2.0