Quotes & Sayings About Security Technology
Enjoy reading and share 64 famous quotes about Security Technology with everyone.
Top Security Technology Quotes

Our interests are centered in ourselves. We are preoccupied with material things. Our supreme god is technology; our goddess is sex. Most of us are more interested in getting to the moon than in getting to heaven, more concerned about conquering space than about conquering ourselves. We are more dedicated to material security than to inner purity. We give much more thought to what we wear, what we eat, what we drink, and what we can do to relax than we give to what we are. This preoccupation with peripheral things applies to every area of our lives. — Billy Graham

The same technology transforming our lives can solve the greatest problem of the 20th century. A security shield can one day render nuclear weapons obsolete and free mankind from the prison of nuclear terror. America met one historic challenge and went to the Moon. Now America must meet another: to make our strategic defense real for all the citizens of planet Earth. — Ronald Reagan

It would be unwise to say the least, irresponsible of us at the TSA, at the Homeland Security Department not to evolve our technology to match the changing threat environment that we inhabit. — Janet Napolitano

When you think about things like power efficiency or performance or Internet connectivity as major technology areas where you have multiple investments, multiple products - security is like that. — Renee James

If we had been less reliant on technology and the security that we enjoy in being divorced from what we used to know, maybe things would have turned out differently. — Heather Donahue

Complexity kills. It sucks the life out of developers, it makes products difficult to plan, build and test, it introduces security challenges, and it causes end-user and administrator frustration. — Ray Ozzie

The most important impact of technology on communications security is that it draws better and better traffic into vulnerable channels. — Whitfield Diffie

One of the things that has been truly incredible to observe though, is the amount of venture investment that has gone into early stage security technology. — John W. Thompson

Energy has become a national security issue and as technology continues to improve, there will be more debates like the one on Keystone. — Ed Royce

There's no silver bullet solution with cyber security, a layered defense is the only viable defense — James Scott

If you wanna know how not secure you are, just take a look around. Nothing's secure. Nothing's safe. I don't hate technology, I don't hate hackers, because that's just what comes with it, without those hackers we wouldn't solve the problems we need to solve, especially security. — Fred Durst

One crucial fact must be kept in mind: none of the roughly seventy thousand nuclear weapons built by the United States since 1945 has ever detonated inadvertently or without proper authorization. The technological and administrative controls on those weapons have worked, however imperfectly at times - and countless people, military and civilian, deserve credit for that remarkable achievement. Had a single weapon been stolen or detonated, America's command-and-control system would still have attained a success rate of 99.99857 percent. But nuclear weapons are the most dangerous technology ever invented. Anything less than 100 percent control of them, anything less than perfect safety and security, would be unacceptable. And if this book has any message to preach, it is that human beings are imperfect. — Eric Schlosser

In order to keep up with the criminals and to protect our national security, the solution is clear: we need legislation to ensure that telephone companies and other carriers provide law enforcement with access to this new technology. — Louis J. Freeh

Whether it's watching a $4,000 laptop fall off the conveyor belt at airport security, contending with a software conflict that corrupted your file management system, or begging your family to stop opening those virus-carrying 'greeting cards' attached to emails, all computer owners are highly leveraged and highly vulnerable technology investors. — Douglas Rushkoff

Today more than ever, the traditional boundaries between politics, culture, technology, finance, national security and ecology are disappearing. You often cannot explain one without referring to the others, and you cannot explain the whole without reference to them all. — Thomas L. Friedman

As it turns out, American-made technology had helped Mubarak and his security state collect, compile, and parse vast amounts of data about everyday citizens. — Rebecca MacKinnon

Information technology (IT) assets must be protected from external and internal activities detrimental to effective and efficient functionality. — Robert E. Davis

The combination of the growth of these digital technologies, the ability of the government to conjure up these secret interpretations, plus a very unusual and novel court make for this ever-expanding surveillance state. We so treasure our freedoms; we will regret it if our generation doesn't use this unique time to reform the surveillance laws and make it clear that security and liberty are not mutually exclusive. We can do both. — Ron Wyden

If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology. — Bruce Schneier

Computer security can simply be protecting your equipment and files from disgruntled employees, spies, and anything that goes bump in the night, but there is much more. Computer security helps ensure that your computers, networks, and peripherals work as expected all the time, and that your data is safe in the event of hard disk crash or a power failure resulting from an electrical storm. Computer security also makes sure no damage is done to your data and that no one is able to read it unless you want them to — Bruce Schneier

A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted. — Kevin Mitnick

Research by James Poterba at the Massachusetts Institute of Technology finds that the wealth of the U.S.'s elderly is highly skewed. About half of retirees have little or no financial wealth when they retire and depend almost entirely on Social Security for their income. — Greg Ip

Effective use of Braille is as important to the blind as independent mobility, knowledge in the use of adaptive technology, and the core belief that equality, opportunity and security are truly possible for all people who are blind. — Bob Ney

This was not, of course, the first time that significant monies were spent on military programs. Kennedy knew, if only implicitly, that while bravery may win battles, science and technology provide security. Science and technology win wars. — Neil DeGrasse Tyson

Pakistan has accepted some security training from the CIA, but U.S. export restrictions and Pakistani suspicions have prevented the two countries from sharing the most sophisticated technology for safeguarding nuclear components. — Barton Gellman

It's very important to remember that it's your intellectual property; it's not your computer. And in the pursuit of protection of intellectual property, it's important not to defeat or undermine the security measures that people need to adopt in these days. — Stewart Baker

First, how do we give everyone a fair shot at opportunity and security in this new economy? Second, how do we make technology work for us, and not against us - especially when it comes to solving urgent challenges like climate change? Third, how do we keep America safe and lead the world without becoming its policeman? — Barack Obama

That many if not most people ... who want fresh leafy greens in January buy them at the supermarket after they've been bleached and plastic-bag shipped from California or beyond is not a tribute to modern technology; it's an unprecedented abdication of personal responsibility and a ubiquitous benchmark of abnormality. — Joel Salatin

Technology businesses in general are susceptible to hacking. That's why you have to work really, really, really hard with law enforcement, with security experts, internal and external groups, to make sure you're paying attention and addressing security concerns. — Evan Spiegel

History has taught us: never underestimate the amount of money, time, and effort someone will expend to thwart a security system. It's always better to assume the worst. Assume your adversaries are better than they are. Assume science and technology will soon be able to do things they cannot yet. Give yourself a margin for error. Give yourself more security than you need today. When the unexpected happens, you'll be glad you did. — Bruce Schneier

When it comes to taking genes from viruses and bacteria and putting them into plants, people say 'Yuck! Why would scientists do that?' Because sometimes it is the safest, cheapest and most effective technology to advance sustainable agriculture and enhance food security. — Pamela Ronald

Americans need accurate information in order to consider Social Security reform. Too bad the media can't be counted upon to provide it — Herman Cain

Today's technology enables scientists to craft biological, DNA-based viruses that affect only one individual, thus forcing security and intelligence services around the world to both protect the DNA of their own leaders and gather the DNA and other markers of other countries' leaders.3 — Pippa Malmgren

The United States should ... avoid unilateral export controls and controls on technology widely available in world markets. Unilateral controls penalize U.S. exporters without advancing U.S. national security or foreign policy interests. — William J. Clinton

Immigration and border security remain critical issues that I am committed to addressing this year. The good news is that illegal immigration is at an all-time low, making now the time to dedicate the needed technology and resources to finally secure the border for good. As border security improves, I look forward to working in a bipartisan manner to fix our broken immigration system and address the millions of people living in the United States outside of legal status. — John McCain

Today, more than ever before, science holds the key to our survival as a planet and our security and prosperity as a nation. It's time we once again put science at the top of our agenda and work to restore America's place as the world leader in science and technology. — Barack Obama

Our energy future is choice, not fate. Oil dependence is a problem we need no longer have-and it's cheaper not to. U.S. oil dependence can be eliminated by proven and attractive technologies that create wealth, enhance choice, and strengthen common security. — Amory Lovins

Despite global economic concerns, other nations are continuing to push forward and invest in their space capabilities. A U.S. withdrawal from the industry will only allow others to surge in their own capabilities, potentially impacting our national security and technology competitiveness in the future. — Nick Lampson

The bottom line is how do we best provide for the security of the traveling public in light of a determined enemy who is adept at constructing well-designed, well-concealed devices which would not show up in a walk-through metal detector? We're trying to employ the best technology to identify any possible threat. — John Pistole

They may have used alien technology in these things," she said. "But the software they installed to run it all was clearly created by humans - overworked, underpaid programmers like me who take all kinds of shortcuts. The security protocols on the file-sharing system are a total joke. It only took me about five minutes to jailbreak this thing. — Ernest Cline

We didn't install the [Code Red] patch on those DMZ systems because they were only used for development and testing. - Anonymous client, shortly after spending 48 continuous hours removing 2001's Code Red worm from internal corporate servers — Mark G. Graff

The sun-belt and the technology belt can become very powerful when they begin to understand themselves as a community: a community of energy, water and climate security; a community for their common future. — Prince Hassan Bin Talal

One of the reasons for this cataclysmic change of destinies was the inherent weakness of a decaying agricultural empire of the Mughals which after more than two hundred years of rule over vast areas of India, was at its terminal stage and needed a small push to crumble like a house of cards.That push was given by six East India Companies of different European countries which had extracted rights to trade with India from the Mughals but transformed themselves as the arbiters and protectors of several Indian states. In this process they not only became rich but also militarily strong because in the twilight years of the Mughal empire, deteriorating security environment necessitated to arm themselves to protect their economic interests. Because of their inherent superiority as representatives of rising industrial powers, they had access to modern techniques and technology of warfare, which turned out to be the decisive factor in capturing vast territories in India. — Shahid Hussain Raja

Virginia is the absolute leader in homeland security and defense and information technology. — Mark Warner

They can bring the technology in, then you can sell to the enterprise when they want to have better control, better security ... you still have the same biz model as a traditional enterprise sw company, but the way to get into the company is through the end user. — Aaron Levie

With existing technology, we can enforce airport security without sacrificing our personal privacy. — Tom Udall

I have made it a top priority for my administration to deepen cooperation with Israel across the whole spectrum of security issues - intelligence, military, technology. — Barack Obama

Software companies should take more responsibility for security holes, especially in browsers and e-mail clients. There are some straightforward things the industry should be doing right now to fix things, and I don't know why they haven't been done yet. — Tim Berners-Lee

First, I do not think there is any silver bullet to solving the technology side of the security equation. — John W. Thompson

I know the capacity that is there to make tyranny total in America, and we must see to it that this agency [the National Security Agency] and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return. - Senator Frank Church (1975) — Peter Dale Scott

Looking ahead, I believe that the underlying importance of higher education, of science, of technology, of research and scholarship to our quality of life, to the strength of our economy, to our security in many dimensions will continue to be the most important message. — Charles Vest

I really believe that we don't have to make a trade-off between security and privacy. I think technology gives us the ability to have both. — John Poindexter

To achieve a Green Revolution, African farmers, must have access to land and security of tenure. They also need access to markets, technology and improved infrastructure. — Ban Ki-moon

We're an elective democracy where science and technology will define where the economically strong countries in the world will be. And science and technological literacy is important for security, as well. — Neil DeGrasse Tyson

With the enhancements to the security of the passport document itself that biometric technology will bring, it is time to make equivalent enhancements to the process of establishing identity before issuing passports. — Des Browne

Technology will make available to the leaders of major nations, techniques for conducting secret warfare, of which only a bare minimum of the security forces need be appraised ... techniques of weather modification could be employed to produce prolonged periods of drought or storm. — Zbigniew Brzezinski

Refuse to accept the belief that your professional relevance, career success or financial security turns on the next update on the latest technology. Sometimes it's good to put the paddle down and just let the canoe glide. — Simon Mainwaring

The more we expect technology to protect us from people in the same way it protects us from nature, the more we will sacrifice the very values of our society in futile attempts to achieve this security. — Bruce Schneier

Keyless entry in a car is something that we're used to. Somehow, the home has been very resistant to this. Some of it has to do with security, but today we know that technology, when things are invisible, is actually safer than physical artifacts. — Yves Behar

I learned the technology and tradecraft of electronic security in self defense, with a lot of expert help. — Barton Gellman

If the iPhone gained traction, RIM's senior executives believed, it would be with consumers who cared more about YouTube and other Internet escapes than efficiency and security. RIM's core business customers valued BlackBerry's secure and efficient communication systems. Offering mobile access to broader Internet content, says Mr. Conlee, "was not a space where we parked our business. — Sean Silcoff

Any growth requires a temporary loss of security. — Madeline Hunter

National security is a place where the private sector could be helpful because the government is woefully behind the technology curve. But secondly, the bureaucratic processes that have been in place since 9/11 are woefully inadequate as well. — Carly Fiorina