Words to Live By: Quotes from 8 Cybersecurity Influencers

Posted by David Hunt on Nov 19, 2015 2:08:00 AM

 Cyber_Security_Influencer_QuotesDefending business networks from the dangers of cyber attacks can seem daunting at times, but that doesn’t mean we can just give up.

Security incidents are inevitable, but the way you respond is essential to long-term business success. Successful cybersecurity is all about having the right perspective.  

Don’t be afraid to take advice from these cybersecurity influencers when rethinking your security strategy.

Pearls of Wisdom from 8 Cybersecurity Influencers

Liviu Arsene, Senior E-Threat Analyst at Bitdefender:

“A lot has changed from that first reported incident in 2006, when U.S. Air Force Colonel Greg Rattray was cited using the expression “advanced persistent threats” to refer to data-exfiltration Trojans. Nowadays, it has become common practice for cybercriminals to orchestrate covert targeted attacks on government or private institutions, motivated either by a form of activism or good old-fashioned government espionage.”

Ted Schlein, Venture Capitalist at Kleiner Perkins Caufield & Byers:

“Most people are starting to realize that there are only two different types of companies in the world: those that have been breached and know it and those that have been breached and don’t know it. Therefore, prevention is not sufficient and you’re going to have to invest in detection because you’re going to want to know what system has been breached as fast as humanly possible so that you can contain and remediate.”

Kevin Mitnick, “The World’s Most Famous Hacker”:

“Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted; none of these measures address the weakest link in the security chain.”

data security

Bruce Schneier, Cryptographer and Computer Security Expert:

“The mantra of any good security engineer is: 'Security is a not a product, but a process.' It's more than designing strong cryptography into a system; it's designing the entire system such that all security measures, including cryptography, work together.”

Elliot Anderson (Rami Malek) from Mr. Robot:

“People always make the best exploits. I’ve never found it hard to hack most people. If you listen to them, watch them, their vulnerabilities are like a neon sign screwed into their heads”

Shlomo Toubol, CEO of illusive networks:

Tweet: Instead of focusing on the #malware, focus on the #CyberAttacker. He is greedy, he has weaknesses and he makes mistakes“Instead of focusing on the malware, focus on the attacker. He is greedy, he has weaknesses and he makes mistakes.”

John F. Kennedy:  

“There are risks and costs to a program of action—but they are far less than the long range cost of comfortable inaction.”

Edmund Burke, Author and Political Theorist:

“Better be despised for too anxious apprehensions, than ruined by too confident security”

Getting Out Ahead of the Wave of Cyber Attacks

If there’s one thing to take away from these cybersecurity influencers, Tweet: Trying to brush #CyberSecurity concerns under the rug is a recipe for disaster.it’s that trying to brush cybersecurity concerns under the rug is a recipe for disaster. The best way for security professionals to attack the growing waves of cyber crime is to build proactive defense and response plans, unlike typical reflexive approaches.

Each and every security incident is important, but keep your sights set on the bigger cybersecurity picture and start taking the fight to attackers.
Deception Technology

 

 Recommended for you:

Topics: Cyber Security

David Hunt

Written by David Hunt

Senior VP of Worldwide Marketing at illusive networks

Get Email Updates

Deception Technology
  

> Share Post