Quotesia
Home
Authors
Popular authors
William Cullen Bryant
Henry Moore
Thomas Fuller
Virgil Thomson
Judy Garland
Georg C. Lichtenberg
All authors
Today's birthdays
1821 - Charles Baudelaire
1930 - Nathaniel Branden
1926 - Hugh Hefner
1981 - Moran Atias
1933 - Gian Maria Volonte
1963 - Marc Jacobs
Today's birthdays
Popular professions
Architect
Saint
Philosopher
Celebrity
Comedian
Astronaut
All professions
Authors by letter
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All authors
Topics
Top Quotes
Quotesia
Quote Topics
Cyber Quotes
Cyber Quotes
Cyber terrorism could also become more attractive as the real and virtual worlds become more closely coupled, with automobiles, appliances, and other devices attached to the Internet.
Dorothy Denning
Terrorism
Internet
Become
Other
Worlds
Virtual
More
Attached
Could
Devices
Also
Attractive
Coupled
Real
Closely
Automobiles
Cyber
Appliances
People ask me all the time, 'What keeps you up at night?' And I say, 'Spicy Mexican food, weapons of mass destruction, and cyber attacks.'
Dutch Ruppersberger
Time
Food
Me
You
People
Destruction
Say
Spicy
Weapons
Attacks
Mass
Mass Destruction
Mexican
Up
Ask
Cyber
Keeps
Night
Unfortunately, the cyber threat to 'the grid' is only one means of eviscerating the soft underbelly of American society. Another which has been getting increasing attention could be delivered via the kind of nuclear-armed ballistic missile that Iran and North Korea have been developing: a strategic electro-magnetic pulse attack.
Frank Gaffney
Society
Increasing
Pulse
Has-Been
Kind
Threat
Only
Attack
Could
Delivered
Developing
Attention
Missile
Another
Korea
Ballistic
Been
Iran
North
American
North Korea
Via
Getting
Grid
Unfortunately
Which
Cyber
Means
American Society
Strategic
Soft
There are two kinds of people in America today: those who have experienced a foreign cyber attack and know it, and those who have experienced a foreign cyber attack and don't know it.
Frank Wolf
Today
People
Those
Kinds
Attack
Know
Foreign
America
Experienced
Cyber
Who
Two
In America, you have the Cyber Intelligence Sharing and Protection Act. You've got drones now being considered for domestic surveillance. You have the National Security Agency building the world's giantest spy center.
Heather Brooke
You
Intelligence
World
Protection
Building
National
Considered
Security
Drones
Sharing
Got
Domestic
Spy
Surveillance
America
National Security
Being
Center
Agency
Cyber
Act
Now
A lot of people have a lot to gain from peddling scare stories about cyber 'warfare.'
Heather Brooke
People
Scare
About
Lot
Stories
Gain
Warfare
Cyber
The most pervasive cyber threat to the U.S. financial sector is from cyber criminals.
James Clapper
Financial
Criminals
Sector
Threat
Most
Cyber
Pervasive
In the future, we will probably see cyber operations that change or manipulate electronic information to compromise its integrity instead of simply deleting the access to it.
James Clapper
Future
Change
Integrity
Will
See
Compromise
Simply
Instead
Operations
Access
Information
Manipulate
Cyber
Electronic
Although we must be prepared for a catastrophic large-scale strike, a cyber armageddon, the reality is that we have been living with a constant barrage of cyberattacks for some time. The trend, I believe, will continue.
James Clapper
Time
Reality
Trend
Will
Believe
Living
Strike
Must
Constant
Be Prepared
Some
Catastrophic
Armageddon
Although
Continue
Been
Cyber
Prepared
Large-Scale
We have built as a government something called the National Cyber Investigative Joint Task Force, NCIJTF, where 19 federal agencies sit together and divide up the work. See the threat, see the challenge, divide it up and share information.
James Comey
Work
Government
Together
Challenge
National
Sit
Threat
See
Something
Divide
Joint
Federal
Investigative
Share
Force
Built
Up
Task
Task Force
Where
Information
Agencies
Cyber
The FBI has built up substantial expertise to address cyber threats, both in the homeland and overseas. Here at home, the FBI serves as the executive agent for the National Cyber Investigative Joint Task Force (NCIJTF), which joins together 19 intelligence, law enforcement, and military agencies to coordinate cyber threat investigations.
James Comey
Home
Together
Intelligence
Law
National
Military
Address
Threat
Law Enforcement
Threats
Both
Joint
Investigations
Investigative
Executive
Force
Built
Overseas
Up
Task
Task Force
Substantial
Expertise
Which
Agencies
Agent
Enforcement
Cyber
Homeland
Coordinate
Serve
Here
The FBI is engaged in a myriad of efforts to combat cyber threats, from efforts focused on threat identification and sharing inside and outside of government, to our internal emphasis on developing and retaining new talent and changing the way we operate to evolve with the cyber threat.
James Comey
Government
Changing
Our
Way
Focused
Evolve
Inside
Threat
Threats
Myriad
Outside
Retaining
Sharing
Developing
Emphasis
Combat
New
Talent
Identification
Operate
Efforts
Cyber
Engaged
Internal
Everybody should want to make sure that we have the cyber tools necessary to investigate cyber crimes, and to be prepared to defend against them and to bring people to justice who commit it.
Janet Reno
Justice
People
Everybody
Tools
Crimes
Be Prepared
Investigate
Make
Sure
Commit
Want
Against
Them
Should
Cyber
Who
Prepared
Necessary
Bring
Defend
While the Census Bureau already has a legal obligation to keep people's information confidential, we all know that in an age of cyber attacks and computer hacking that ensuring people's privacy can be difficult.
Jeff Duncan
Privacy
Legal
Age
People
Obligation
Difficult
Ensuring
Attacks
Computer
Hacking
Know
Bureau
Confidential
Census
Information
While
Cyber
Keep
A digital currency issued by a central bank would be a global target for cyber attacks, cyber counterfeiting, and cyber theft.
Jerome Powell
Digital
Would
Would-Be
Attacks
Global
Target
Currency
Bank
Central
Central Bank
Theft
Cyber
I think we could very easily suffer a seriously catastrophic cyber event.
John F. Kelly
Seriously
Think
Easily
Could
Catastrophic
Very
Cyber
Event
Suffer
Everything becomes connected, and cyber security becomes the top issue for CEOs. An average company has 40-60 security vendors, and they have a violation every three months with viruses.
John T. Chambers
Three
Every
Everything
Top
Viruses
Months
Security
Vendors
Becomes
Issue
CEOs
Average
Cyber
Connected
Company
Violation
Beatbullying's 'The Big March 2012' is such a brilliant campaign and I am very proud to be a part of it. I have been a victim of cyber bullying myself and I know firsthand just how hurtful it can be. People think that they can hide behind computers and send nasty and hurtful comments to people, and this is wrong.
Katherine Jenkins
Bullying
Myself
People
Hide
Brilliant
Big
Victim
Think
Hurtful
Computers
Part
Wrong
Know
Proud
Firsthand
How
Am
Nasty
Been
Campaign
Very
Comments
Send
Behind
Just
Cyber
March
Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties.
Kevin Mitnick
Day
Financial
Cause
Down
Telephone
Say
Hassle
Objectives
More
Results
Computer
Casualties
Hacking
Like
Access
Terrorist
Losses
Manhattan
Really
Cyber
Therefore
Groups
Serious
Switch
Shut
We are at war, if you will, in the cyber domain now, constantly battling countries, such as Russia or China, who are trying to do everything from steal our technology to influence our elections to put out disinformation about the United States.
Mark Esper
War
You
Technology
Will
Our
Everything
States
Out
Battling
Constantly
About
Russia
Steal
Put
Countries
Domain
Trying
Influence
China
Disinformation
Elections
Cyber
Who
Now
United
United States
The problem with cyber weapons for a country like ours is the ability to control them.
Michael Hayden
Problem
Country
Control
Ours
Weapons
Ability
Like
The Problem With
Them
Cyber
In order to have greater visibility of the larger cyber threat landscape, we must remove the government bureaucratic stovepipes that inhibit our abilities to effectively defend America while ensuring citizens' privacy and civil liberties are also protected.
Michael McCaul
Government
Privacy
Remove
Our
Visibility
Ensuring
Liberties
Must
Citizens
Ability
Threat
Civil
Civil Liberties
Also
Protected
Greater
Effectively
America
Bureaucratic
Order
While
Cyber
Landscape
Inhibit
Larger
Defend
One of the things that we have to keep in mind on Iran is Iran is also a country with ballistic missiles, cyber capabilities.
Michael T. Flynn
Mind
Country
One Of The Things
Missiles
Also
Ballistic
Iran
Capabilities
Cyber
Keep
Things
From bank accounts to financial systems, power grids to air traffic controls - our most critical infrastructure remain attractive cyber targets, and if they are ever compromised, the effects could be devastating.
Mike Quigley
Financial
Power
Our
Air
Critical
Systems
Financial Systems
Compromised
Remain
Could
Devastating
Most
Attractive
Traffic
Effects
Targets
Accounts
Bank
Controls
Infrastructure
Cyber
Ever
I get bullied for my size, my weight, and my look constantly. It's something that I'm glad we touched on in WWE. I'm glad we touched on it because it's real: it's something that happens in real life to kids all the time, especially in the age of cyber bullying.
Nia Jax
Life
Time
Bullying
Age
Real Life
Kids
Constantly
Something
Touched
Glad
Weight
Look
Because
WWE
Real
Bullied
Get
Size
Happens
Cyber
The guardians of your company's cyber security should be encouraged to network within the industry to swap information on the latest hacker tricks and most effective defenses.
Nina Easton
Hacker
Guardians
Latest
Security
Tricks
Network
Most
Industry
Within
Encouraged
Effective
Information
Swap
Should
Cyber
Your
Company
Load more quotes
No more cyber quotes
Haven't find the right quote? Try another of these similiar topics.
Education
Air
About
Actor