One of the problems of the Internet is that we didn't install what I like to call strong user authentication or strong file authentication. We didn't anticipate the level of the dark side we see today. The culture of the early Internet was one of trust of all the users.
The network isn't the computer; it's the battlefield...In the long run, all elements of the network - an in particular, critical elements of software - have to self-defend.
In the past, energy-efficient performance and connectivity have defined computing requirements. Looking forward, security will join those as a third pillar of what people demand from all computing experiences.
The best way to understand a system is to look at it from the point of view of people who want to subvert it.
You don’t have to be paranoid to run a business in the age of cybercrime, but it helps.
Shooting the messenger does not work. Indeed, firms such as Google now offer monetary rewards, or “bug bounties”, to hackers who contact them with details of flaws they have unearthed.
Contractors remain the weak link in the chain for intelligence agencies worldwide...