-
Advanced nation-states are now using cyber power for unrestricted economic warfare and national security-motivated espionage, as well as a force multiplier and signaling instrument in conflicts.
-
The GRU is used for both tactical intelligence collection in the battlefield in support of Russian military operations and also strategic active measures or psychological warfare overseas.
-
The U.S. government is actually exceptionally vulnerable.
-
CrowdStrike stands fully by its analysis and findings identifying two separate Russian intelligence-affiliated adversaries present in the DNC network in May 2016.
-
Cyber criminals are good... but they cut corners. They don't spend a lot of time tweaking things and making sure that every aspect of the attack is obfuscated.
-
I divide the entire set of Fortune Global 2000 firms into two categories: those that know they've been compromised and those that don't yet know.
-
I think it's safe to say that the Russians are extremely interested in anything that has to do with the U.S. political system. And it's not out of the realm of possibility that they are in many other systems.
-
You have a very large population of hackers in Eastern Europe in general and Russia especially. A lot of them consider themselves patriotic individuals and will take broad direction from government policies.
-
After the investigation of Operation Aurora, the cyberattack on Google from within China that was revealed in 2010, I realized a completely new type of security strategy and technology was needed.
-
I think every organization needs to assume that they are compromised.
-
At CrowdStrike, we look for traces of the adversary and try to find out who the adversary is, what they are after, and what their tradecraft is. We also disseminate that information to enable collective action.
-
AI is going to be extremely beneficial, and already is, to the field of cybersecurity. It's also going to be beneficial to criminals.
-
The difference between theft and destruction is often a few keystrokes.
-
If someone stole your keys to encrypt the data, it didn't matter how secure the algorithms were.
-
Organizations, whether they are nonprofits or enterprise, need to be aware that nation-states are coming after them for political espionage, economic espionage, or destructive attacks.
-
It's a great honor to be selected as one of 'Foreign Policy''s Leading Global Thinkers for 2013.