Bad piggies hacked resources.assets5/1/2023 ![]() ![]() The software industry is really one of the only organizations where you can knowingly build a defective product and push it out to a potential buyer and the buyer assumes all the risk. You can't hold firewalls and intrusion detection systems accountable. I don't have to show you any stinkin' badges! - from the film "Treasure of Sierra Madre" ![]() Sed quis custodiet ipsos custodes? īadges? We ain't got no badges! We don't need no badges. Yuval Noah Harari, Homo Deus: A Brief History of Tomorrow In the twenty-first century our personal data is probably the most valuable resource most humans still have to offer, and we are giving it to the tech giants in exchange for email services and funny cat videos. In the heyday of European imperialism, conquistadors and merchants bought entire islands and countries in exchange for coloured beads. How could Facebook obtain this priceless political data? We provide it for free. Mark's Law)įacebook could tell that in Oklahoma the race between Republicans and Democrats is particularly close, identify the 32,417 voters who still haven’t made up their minds, and determine what each candidate needs to say in order to tip the balance. Half of what you know about security will be obsolete in 18 months. ![]() If they are patriotically minded, they start making their contributions – which are right, from their point of view – to fight against those who say bad things about Russia. Hackers are free people, just like artists who wake up in the morning in a good mood and start painting. All of our content is specifically designed to look like us. The more we feed them our "likes," our "clicks," and our "choices," the more of ourselves the algorithms volley back. Niccolo Machiavelliįilter Bubbles are the work of algorithms programmed to constantly reflect back to us variations of our own image. It is much more secure to be feared than to be loved. GosserĪ computer lets you make more mistakes faster than any invention in human history - with the possible exceptions of handguns and tequila. Securing a computer system has traditionally been a battle of wits: the penetrator tries to find the holes, and the designer tries to close them. The only expenses are ransomware fees if someone fails. Plenty of crooks are happy to run a corporate phishing program for no up-front cost. Let us not look back in anger or forward in fear, but around in awareness. They are best when new and should never be shared." If you are trying to explain a difficult topic, try out the security analogies page for explanations like this: "Suggesting that IT security issues can be dealt with simply by drafting and implementing a security policy is like saying that speeding drivers won’t be a problem if we introduce speed limits" - Reflex Magnetics Security Quotes ![]() If you're aware of a correction or if you have a security-related quote that you'd like added to this page, please let us know.Ĭheck out these other pages for a bunch of entertaining security slogans like this one: " Passwords are like toothbrushes. This material is largely based on email, newsgroup, or web postings of presumably public domain material. These security quotations relate to computers, information technology, and human nature. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |