Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

Words to Live By: Quotes from 8 Cybersecurity Influencers

Posted by the Illusive Networks team on Nov 19, 2015 2:08:00 AM

 Cyber_Security_Influencer_QuotesDefending business networks from the dangers of cyber attacks can seem daunting at times, but that doesn’t mean we can just give up.

Security incidents are inevitable, but the way you respond is essential to long-term business success. Successful cybersecurity is all about having the right perspective.  

Don’t be afraid to take advice from these cybersecurity influencers when rethinking your security strategy.

Pearls of Wisdom from 8 Cybersecurity Influencers

Liviu Arsene, Senior E-Threat Analyst at Bitdefender:

“A lot has changed from that first reported incident in 2006, when U.S. Air Force Colonel Greg Rattray was cited using the expression “advanced persistent threats” to refer to data-exfiltration Trojans. Nowadays, it has become common practice for cybercriminals to orchestrate covert targeted attacks on government or private institutions, motivated either by a form of activism or good old-fashioned government espionage.”

Ted Schlein, Venture Capitalist at Kleiner Perkins Caufield & Byers:

“Most people are starting to realize that there are only two different types of companies in the world: those that have been breached and know it and those that have been breached and don’t know it. Therefore, prevention is not sufficient and you’re going to have to invest in detection because you’re going to want to know what system has been breached as fast as humanly possible so that you can contain and remediate.”

Kevin Mitnick, “The World’s Most Famous Hacker”:

“Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted; none of these measures address the weakest link in the security chain.”

< What's the difference between honeypots and deception tech? Click to find  out >

Bruce Schneier, Cryptographer and Computer Security Expert:

“The mantra of any good security engineer is: 'Security is a not a product, but a process.' It's more than designing strong cryptography into a system; it's designing the entire system such that all security measures, including cryptography, work together.”

Elliot Anderson (Rami Malek) from Mr. Robot:

“People always make the best exploits. I’ve never found it hard to hack most people. If you listen to them, watch them, their vulnerabilities are like a neon sign screwed into their heads”

Shlomo Toubol, CEO of illusive networks:

Tweet: Instead of focusing on the #malware, focus on the #CyberAttacker. He is greedy, he has weaknesses and he makes mistakes“Instead of focusing on the malware, focus on the attacker. He is greedy, he has weaknesses and he makes mistakes.”

John F. Kennedy:  

“There are risks and costs to a program of action—but they are far less than the long range cost of comfortable inaction.”

Edmund Burke, Author and Political Theorist:

“Better be despised for too anxious apprehensions, than ruined by too confident security”

Getting Out Ahead of the Wave of Cyber Attacks

If there’s one thing to take away from these cybersecurity influencers, Tweet: Trying to brush #CyberSecurity concerns under the rug is a recipe for’s that trying to brush cybersecurity concerns under the rug is a recipe for disaster. The best way for security professionals to attack the growing waves of cyber crime is to build proactive defense and response plans, unlike typical reflexive approaches.

Each and every security incident is important, but keep your sights set on the bigger cybersecurity picture and start taking the fight to attackers.
Deception Technology


 Recommended for you:

Topics: Cybersecurity

Stay up to date!