Quotables

Quotables

Welcome to our Quotables page.  We’re thrilled to offer FREE quotables that you can use anytime in a press release, on your website, in a whitepaper, wherever you wish!  Our Publisher is a Founding Member of the US DHS, spent years on the MITRE CVE Oval advisory board, Norwich Cyberwarfare Research Labs advisory board, a founding Board member of the National Information Security Group and much more.  He even sold his first company to McAfee, many years ago.  He has patents on information security technology and continues to research and develop innovations in this field.  His information comes from OSINT (Open Source Intelligence) and his own insights.  You could not find a more credible source for Cybercrime Statistics.

COST OF CYBERCRIME:

“Cybercrime has surpassed Drug Crime as the largest form of global thievery since an inflection point in 2018 and continues to grow.  At Cyber Defense Magazine, we predict that Cybercrime will account for over $12 trillion in theft and damages by 2025,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine and Cybersecurity Expert.

CYBERSECURITY JOB OPPORTUNITIES:

“There will be a global shortage of more than 7 million cybersecurity jobs worldwide by January 2025,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine and Cybersecurity Expert, “This will lead to more reliance on artificial intelligence and machine learning.”

CYBERSECURITY PRODUCTS AND SERVICES SPENDING:

Cyber Defense Magazine expert Gary Miliefsky estimates that “between 2023 and 2025, more than $2.8 trillion will be spent, cumulatively, on cyber security products and services.”

IDENTITY AND ACCESS MANAGEMENT (IAM):

“Last year, spear phishing was the biggest threat to organizations – now through 2025, I predict that there will be a new wave of breaches and malicious insider data theft from the tremendous shift to Cloud-based SaaS and Work From Home (WFH).  Therefore, IAM for Cloud and Corporate Networks will become a very hot topic and we need to include our MSSPs, Cloud-providers, Auditors and HR teams in the equation if we are going to get ahead of this wave of tremendous risk,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine and Cybersecurity Expert.

CYBER DEFENSE ENTREPRENEURSHIP INSPIRATION:

Quotables

“You have to take a leap if you want to attain your goals.  Remember where you are from and don’t ever forget what your loved ones have done for you.  Always live on the edge of tears.  Always push yourself to be better.”  Dr. David G. DeWalt, Founder, NightDragon Security

LOOKING AT THE ROOT CAUSE ANALYSIS – SOFTWARE CODE VULNERABILITIES:

Quotables

“We need to reduce the attack surface by helping the developers write secure code all the way through the software production line,” Craig Hinkley, CEO of WhiteHat Security

MOST BREACHES CAUSED BY NON-SOPHISTICATED ATTACKS:

“The biggest form of cybercrime is spear phishing and remote access trojans (RATs), which are not that sophisticated at all” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine and Cybersecurity Expert.

Another example of how Spear Phishing and RATs have affected the US Government: https://www.cnn.com/videos/tv/2015/04/08/exp-cybersecurity-expert-on-white-house-hack.cnn among others…

ATTRIBUTION IS GETTING HARDER:

“With nation states in the cyber espionage game and practicing cyberwarfare, hacktivists and cyber criminals deploying ransomware to be paid anonymously using bitcoins, attribution continues to get harder,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine and Cybersecurity Expert.

Until you can get to the SOURCE KEYBOARD behind the final ISP ROUTER, you can’t fully attribute the source:

PERSONALLY IDENTIFYABLE INFORMATION (PII) RECORDS BREACHES:

“According to PrivacyRights.org, the total breaches as of early 2018 were over TEN BILLION RECORDS BREACHED from OVER 8000 DATA BREACHES made public since 2005,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine and Cybersecurity Expert.

“Cyber Defense Magazine predicts that all citizens with a mobile device, tablet and/or personal computer will experience a records breach by 2020,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine and Cybersecurity Expert.

REGULATORY COMPLIANCE

“Most organizations will not be in compliance based on the various regulations which affect them including GLBA, HIPAA/HITECH, Sarbanes Oxley, VISA PCI and GDPR throughout 2018 because of the strong requirements for due care and due diligence including strong encryption, best practices key management, frequent internal audits, penetration testing and the need for advanced approaches to stop the latest threats,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine and Cybersecurity Expert.

“Larger organizations face the most risk to comply with newer regulations like GDPR and may face significant class action law suits and regulatory fines, when they suffer from a breach,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine and Cybersecurity Expert.

MOBILE DEVICES AND BYOD DILEMMA 

“Most organizations have allowed a new attack vector in the front door – infected mobile devices.  I’ve personally discovered emoji keyboards as key-loggers, flashlight (torch) apps, bible apps, qr readers, vpns, alarm clocks and audio players eavesdropping and connecting to servers in other countries while collecting way too much information off these devices,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine and Cybersecurity Expert.

(most viewed mobile malware discussion video, globally with over 6.8m views)

“We all use about 5 apps on our smartphones yet we have over 40 to 50 installed, without ever checking the sources and permissions – we’ve installed malware and creepware and its time for a smartphone cleanup,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine and Cybersecurity Expert.

“Most apps are collecting way too much information and need to be removed before allowing smartphones and tablets to enter the corporate network,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine and Cybersecurity Expert.

See: https://www.cbsnews.com/news/mobile-phone-apps-malware-risks-how-to-prevent-hacking-breach/

STRONG ENCRYPTION IS GOOD FOR AMERICA AND EVERYONE, GLOBALLY

“Adding backdoors and weakening encryption is bad for consumer privacy and horrible for national security.  Once you do this for one agency, other nation states will gain access within hours or days.  Better to build great infosec products with strong crypto and no backdoors,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine and Cybersecurity Expert.

CUSTOM QUOTABLES:

Let us know if you’d like a custom quote.  Just email [email protected] – we don’t charge and we don’t limit reuse and reprint rights of our quotables.  We’re here to help you spread the word, awaken your C level executives and Board of Directors and improve your cybersecurity posture.  It’s all about Cyber Defense.

Subscribe to Cyber Defense Magazine

Join our mailing list, no strings attached. We never sell your data. We'll send you monthly e-magazines, webinar invites from us and our partners, cybersecurity trade show updates, awards, infosec news, cybersecurity tips and so much more on all things cyber defense.
Subscribe

cyber defense awardsWe are in our 11th year, and Global InfoSec Awards are incredibly well received – helping build buzz, customer awareness, sales and marketing growth opportunities, investment opportunities and so much more.
Cyber Defense Awards

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X