In an age of dynamic malware obfuscation through operations such as mutating hash, a hyper-evolving threat landscape, and technologically next generation adversaries, offensive campaigns have an overwhelming advantage over defensive strategies.

James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

Related Quotes