If developed and implemented meaningfully, Cyber Shield Act could be a catalyst to incite responsible cybersecurity adoption and implementation throughout multiple manufacturing sectors."James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The two main problems with signature and heuristic based anti-virus is the mutating hash and the fact that you first need a victim in order to obtain the signature."James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Most IoT devices that lack security by design simply pass the security responsibility to the consumer, thus, treating the customers as techno-crash test dummies.James Scott, Senior Fellow, Institute for Critical Infrastructure Technology