Quotes & Sayings About Security Technology
Enjoy reading and share 64 famous quotes about Security Technology with everyone.
Top Security Technology Quotes
Our interests are centered in ourselves. We are preoccupied with material things. Our supreme god is technology; our goddess is sex. Most of us are more interested in getting to the moon than in getting to heaven, more concerned about conquering space than about conquering ourselves. We are more dedicated to material security than to inner purity. We give much more thought to what we wear, what we eat, what we drink, and what we can do to relax than we give to what we are. This preoccupation with peripheral things applies to every area of our lives. — Billy Graham
The same technology transforming our lives can solve the greatest problem of the 20th century. A security shield can one day render nuclear weapons obsolete and free mankind from the prison of nuclear terror. America met one historic challenge and went to the Moon. Now America must meet another: to make our strategic defense real for all the citizens of planet Earth. — Ronald Reagan
It would be unwise to say the least, irresponsible of us at the TSA, at the Homeland Security Department not to evolve our technology to match the changing threat environment that we inhabit. — Janet Napolitano
When you think about things like power efficiency or performance or Internet connectivity as major technology areas where you have multiple investments, multiple products - security is like that. — Renee James
If we had been less reliant on technology and the security that we enjoy in being divorced from what we used to know, maybe things would have turned out differently. — Heather Donahue
Complexity kills. It sucks the life out of developers, it makes products difficult to plan, build and test, it introduces security challenges, and it causes end-user and administrator frustration. — Ray Ozzie
The most important impact of technology on communications security is that it draws better and better traffic into vulnerable channels. — Whitfield Diffie
One of the things that has been truly incredible to observe though, is the amount of venture investment that has gone into early stage security technology. — John W. Thompson
Energy has become a national security issue and as technology continues to improve, there will be more debates like the one on Keystone. — Ed Royce
There's no silver bullet solution with cyber security, a layered defense is the only viable defense — James Scott
If you wanna know how not secure you are, just take a look around. Nothing's secure. Nothing's safe. I don't hate technology, I don't hate hackers, because that's just what comes with it, without those hackers we wouldn't solve the problems we need to solve, especially security. — Fred Durst
One crucial fact must be kept in mind: none of the roughly seventy thousand nuclear weapons built by the United States since 1945 has ever detonated inadvertently or without proper authorization. The technological and administrative controls on those weapons have worked, however imperfectly at times - and countless people, military and civilian, deserve credit for that remarkable achievement. Had a single weapon been stolen or detonated, America's command-and-control system would still have attained a success rate of 99.99857 percent. But nuclear weapons are the most dangerous technology ever invented. Anything less than 100 percent control of them, anything less than perfect safety and security, would be unacceptable. And if this book has any message to preach, it is that human beings are imperfect. — Eric Schlosser
In order to keep up with the criminals and to protect our national security, the solution is clear: we need legislation to ensure that telephone companies and other carriers provide law enforcement with access to this new technology. — Louis J. Freeh
Whether it's watching a $4,000 laptop fall off the conveyor belt at airport security, contending with a software conflict that corrupted your file management system, or begging your family to stop opening those virus-carrying 'greeting cards' attached to emails, all computer owners are highly leveraged and highly vulnerable technology investors. — Douglas Rushkoff
Today more than ever, the traditional boundaries between politics, culture, technology, finance, national security and ecology are disappearing. You often cannot explain one without referring to the others, and you cannot explain the whole without reference to them all. — Thomas L. Friedman
As it turns out, American-made technology had helped Mubarak and his security state collect, compile, and parse vast amounts of data about everyday citizens. — Rebecca MacKinnon
Information technology (IT) assets must be protected from external and internal activities detrimental to effective and efficient functionality. — Robert E. Davis
Better locks just means better burglars. — Marty Rubin
The combination of the growth of these digital technologies, the ability of the government to conjure up these secret interpretations, plus a very unusual and novel court make for this ever-expanding surveillance state. We so treasure our freedoms; we will regret it if our generation doesn't use this unique time to reform the surveillance laws and make it clear that security and liberty are not mutually exclusive. We can do both. — Ron Wyden
If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology. — Bruce Schneier
Computer security can simply be protecting your equipment and files from disgruntled employees, spies, and anything that goes bump in the night, but there is much more. Computer security helps ensure that your computers, networks, and peripherals work as expected all the time, and that your data is safe in the event of hard disk crash or a power failure resulting from an electrical storm. Computer security also makes sure no damage is done to your data and that no one is able to read it unless you want them to — Bruce Schneier
A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted. — Kevin Mitnick
Research by James Poterba at the Massachusetts Institute of Technology finds that the wealth of the U.S.'s elderly is highly skewed. About half of retirees have little or no financial wealth when they retire and depend almost entirely on Social Security for their income. — Greg Ip
Effective use of Braille is as important to the blind as independent mobility, knowledge in the use of adaptive technology, and the core belief that equality, opportunity and security are truly possible for all people who are blind. — Bob Ney
This was not, of course, the first time that significant monies were spent on military programs. Kennedy knew, if only implicitly, that while bravery may win battles, science and technology provide security. Science and technology win wars. — Neil DeGrasse Tyson
Pakistan has accepted some security training from the CIA, but U.S. export restrictions and Pakistani suspicions have prevented the two countries from sharing the most sophisticated technology for safeguarding nuclear components. — Barton Gellman
It's very important to remember that it's your intellectual property; it's not your computer. And in the pursuit of protection of intellectual property, it's important not to defeat or undermine the security measures that people need to adopt in these days. — Stewart Baker
First, how do we give everyone a fair shot at opportunity and security in this new economy? Second, how do we make technology work for us, and not against us - especially when it comes to solving urgent challenges like climate change? Third, how do we keep America safe and lead the world without becoming its policeman? — Barack Obama
That many if not most people ... who want fresh leafy greens in January buy them at the supermarket after they've been bleached and plastic-bag shipped from California or beyond is not a tribute to modern technology; it's an unprecedented abdication of personal responsibility and a ubiquitous benchmark of abnormality. — Joel Salatin
Technology businesses in general are susceptible to hacking. That's why you have to work really, really, really hard with law enforcement, with security experts, internal and external groups, to make sure you're paying attention and addressing security concerns. — Evan Spiegel
History has taught us: never underestimate the amount of money, time, and effort someone will expend to thwart a security system. It's always better to assume the worst. Assume your adversaries are better than they are. Assume science and technology will soon be able to do things they cannot yet. Give yourself a margin for error. Give yourself more security than you need today. When the unexpected happens, you'll be glad you did. — Bruce Schneier
When it comes to taking genes from viruses and bacteria and putting them into plants, people say 'Yuck! Why would scientists do that?' Because sometimes it is the safest, cheapest and most effective technology to advance sustainable agriculture and enhance food security. — Pamela Ronald
Americans need accurate information in order to consider Social Security reform. Too bad the media can't be counted upon to provide it — Herman Cain
Today's technology enables scientists to craft biological, DNA-based viruses that affect only one individual, thus forcing security and intelligence services around the world to both protect the DNA of their own leaders and gather the DNA and other markers of other countries' leaders.3 — Pippa Malmgren
The United States should ... avoid unilateral export controls and controls on technology widely available in world markets. Unilateral controls penalize U.S. exporters without advancing U.S. national security or foreign policy interests. — William J. Clinton
Immigration and border security remain critical issues that I am committed to addressing this year. The good news is that illegal immigration is at an all-time low, making now the time to dedicate the needed technology and resources to finally secure the border for good. As border security improves, I look forward to working in a bipartisan manner to fix our broken immigration system and address the millions of people living in the United States outside of legal status. — John McCain
Today, more than ever before, science holds the key to our survival as a planet and our security and prosperity as a nation. It's time we once again put science at the top of our agenda and work to restore America's place as the world leader in science and technology. — Barack Obama
Our energy future is choice, not fate. Oil dependence is a problem we need no longer have-and it's cheaper not to. U.S. oil dependence can be eliminated by proven and attractive technologies that create wealth, enhance choice, and strengthen common security. — Amory Lovins
Despite global economic concerns, other nations are continuing to push forward and invest in their space capabilities. A U.S. withdrawal from the industry will only allow others to surge in their own capabilities, potentially impacting our national security and technology competitiveness in the future. — Nick Lampson
The bottom line is how do we best provide for the security of the traveling public in light of a determined enemy who is adept at constructing well-designed, well-concealed devices which would not show up in a walk-through metal detector? We're trying to employ the best technology to identify any possible threat. — John Pistole
They may have used alien technology in these things," she said. "But the software they installed to run it all was clearly created by humans - overworked, underpaid programmers like me who take all kinds of shortcuts. The security protocols on the file-sharing system are a total joke. It only took me about five minutes to jailbreak this thing. — Ernest Cline
We didn't install the [Code Red] patch on those DMZ systems because they were only used for development and testing. - Anonymous client, shortly after spending 48 continuous hours removing 2001's Code Red worm from internal corporate servers — Mark G. Graff
The sun-belt and the technology belt can become very powerful when they begin to understand themselves as a community: a community of energy, water and climate security; a community for their common future. — Prince Hassan Bin Talal
One of the reasons for this cataclysmic change of destinies was the inherent weakness of a decaying agricultural empire of the Mughals which after more than two hundred years of rule over vast areas of India, was at its terminal stage and needed a small push to crumble like a house of cards.That push was given by six East India Companies of different European countries which had extracted rights to trade with India from the Mughals but transformed themselves as the arbiters and protectors of several Indian states. In this process they not only became rich but also militarily strong because in the twilight years of the Mughal empire, deteriorating security environment necessitated to arm themselves to protect their economic interests. Because of their inherent superiority as representatives of rising industrial powers, they had access to modern techniques and technology of warfare, which turned out to be the decisive factor in capturing vast territories in India. — Shahid Hussain Raja
Virginia is the absolute leader in homeland security and defense and information technology. — Mark Warner
They can bring the technology in, then you can sell to the enterprise when they want to have better control, better security ... you still have the same biz model as a traditional enterprise sw company, but the way to get into the company is through the end user. — Aaron Levie
With existing technology, we can enforce airport security without sacrificing our personal privacy. — Tom Udall
I have made it a top priority for my administration to deepen cooperation with Israel across the whole spectrum of security issues - intelligence, military, technology. — Barack Obama
Software companies should take more responsibility for security holes, especially in browsers and e-mail clients. There are some straightforward things the industry should be doing right now to fix things, and I don't know why they haven't been done yet. — Tim Berners-Lee
First, I do not think there is any silver bullet to solving the technology side of the security equation. — John W. Thompson
I know the capacity that is there to make tyranny total in America, and we must see to it that this agency [the National Security Agency] and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return. - Senator Frank Church (1975) — Peter Dale Scott
Looking ahead, I believe that the underlying importance of higher education, of science, of technology, of research and scholarship to our quality of life, to the strength of our economy, to our security in many dimensions will continue to be the most important message. — Charles Vest
I really believe that we don't have to make a trade-off between security and privacy. I think technology gives us the ability to have both. — John Poindexter
To achieve a Green Revolution, African farmers, must have access to land and security of tenure. They also need access to markets, technology and improved infrastructure. — Ban Ki-moon
We're an elective democracy where science and technology will define where the economically strong countries in the world will be. And science and technological literacy is important for security, as well. — Neil DeGrasse Tyson
With the enhancements to the security of the passport document itself that biometric technology will bring, it is time to make equivalent enhancements to the process of establishing identity before issuing passports. — Des Browne
Technology will make available to the leaders of major nations, techniques for conducting secret warfare, of which only a bare minimum of the security forces need be appraised ... techniques of weather modification could be employed to produce prolonged periods of drought or storm. — Zbigniew Brzezinski
Refuse to accept the belief that your professional relevance, career success or financial security turns on the next update on the latest technology. Sometimes it's good to put the paddle down and just let the canoe glide. — Simon Mainwaring
The more we expect technology to protect us from people in the same way it protects us from nature, the more we will sacrifice the very values of our society in futile attempts to achieve this security. — Bruce Schneier
Keyless entry in a car is something that we're used to. Somehow, the home has been very resistant to this. Some of it has to do with security, but today we know that technology, when things are invisible, is actually safer than physical artifacts. — Yves Behar
I learned the technology and tradecraft of electronic security in self defense, with a lot of expert help. — Barton Gellman
If the iPhone gained traction, RIM's senior executives believed, it would be with consumers who cared more about YouTube and other Internet escapes than efficiency and security. RIM's core business customers valued BlackBerry's secure and efficient communication systems. Offering mobile access to broader Internet content, says Mr. Conlee, "was not a space where we parked our business. — Sean Silcoff
Any growth requires a temporary loss of security. — Madeline Hunter
National security is a place where the private sector could be helpful because the government is woefully behind the technology curve. But secondly, the bureaucratic processes that have been in place since 9/11 are woefully inadequate as well. — Carly Fiorina