I always like Iain Banks science fiction stuff and William Gibson's cyberpunk stuff from the 1980s.
Alastair Reynolds
We have a cadre of home-grown cyber-skilled professionals to meet the demands of an increasingly digital world, in the public and private sectors and in defence.
Amber Rudd
Why does the American cyberindustry have a thing for Indians?
Amitava Kumar
Does the entry of Indian H-1B worker augur a change in the relations of production in the world of cybertechnology? No, but the presence of such workers - their skills and their histories - introduce contradictions into the system that are not always easily absorbed or dissolved.
In the 21st century, our adversaries will continue to use cyberattacks against us. We need to be prepared to defend our networks against this growing threat to our democracy, especially the most fundamental part of our political system: our elections.
Amy Klobuchar
We know that the government in China has been involved in cyber attacks before. I look at our partners around the world, our traditional allies, our NATO partners who are making the same assessment. We share so much with them and rely on their technology, their expertise and interoperability in many aspects of our own armed forces.
Andrew Scheer
The government of China has admitted that they've been involved in cyber infiltrations around the world and in governments.
We need people building companies all over the country to innovate in aviation, consumer products, education, health, cybersecurity, biotech, manufacturing, and everything in between.
Andrew Yang
We are now living on Internet time. It's a new territory, and the cyber equivalent of the Oklahoma land rush is on.
Andy Grove
There are people I've blocked for a long time who will still respond to every single person that replies positively to me on Twitter. I have quite a few cyber-stalkers like that.
Anita Sarkeesian
Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.
Anna Maria Chavez
Cyber bullies can hide behind a mask of anonymity online, and do not need direct physical access to their victims to do unimaginable harm.
At Girl Scouts, we are committed to raising awareness about the terrible effects of cyber bullying, and to teaching girls how to recognize the signs of bullying of any sort and extricate themselves or another from a bad situation before it spirals out of control and ends in tragedy.
Global pandemics, cyberwarfare, information warfare - these are threats that require highly motivated, highly educated bureaucrats; a national health-care system that covers the entire population; public schools that train students to think both deeply and flexibly; and much more.
Anne Applebaum
We have to replace our focus on personalities with a focus on ideas so that the opinionated and self-serving pronouncements and forms of cyber-bullying are replaced by thoughtful dialogue and open-minded conversation.
Anthony Carmona
During the last years of university I started an online business with a couple of friends selling domain names - we started by cybersquatting and then we became a real business. Someone bought us after three years and we made a good deal.
Antoine Arnault
When I look at the web, it's clear that the web is a fantastic instrument for all of us. It's clear that we have the dark web and the deep web and all the problems of cybersecurity, etc. And the question of regulation is a very complex question in relation to this.
Antonio Guterres
I can't stress to you enough how much I can relate to teens being cyberbullied. Something that helps me is looking at old videos of me and my friends from middle school, or videos of my family. I love watching funny videos of my favorite people - it really cheers me up.
Ariana Grande
When I get back from this book tour, I'm planning to learn the internet. Maybe I can hook up in cyberspace.
Armistead Maupin
Some say Edward Snowden is a hero and a patriot. Others say he's a fool and a traitor. The evidence is mounting that the guy who leaked the details about the National Security Agency's Internet-eavesdropping program may be something more sinister - namely, a willing tool in China's ongoing cyberwar against our nation.
Arthur L. Herman
In response to Russia's election hacking, the U.S. expelled not just one, but 35 spies posing as diplomats - the strongest response ever to a cyberattack against the U.S.
Unsettling signs of al Qaeda's aims and skills in cyberspace have led some government experts to conclude that terrorists are at the threshold of using the Internet as a direct instrument of bloodshed.
China and Russia are regarded as the most formidable cyber threats.
Stuxnet, a computer worm reportedly developed by the United States and Israel that destroyed Iranian nuclear centrifuges in attacks in 2009 and 2010, is often cited as the most dramatic use of a cyber weapon.
Government never adapts quickly to new challenges, but our slow-footedness on cyber is unparalleled.
Since arriving in Washington in January 2015, I have pushed for a strategic framework that clearly articulates how we'll tackle threats in cyberspace.
The nature and scope of security threats in the cyber era are four-dimensional compared to the early nuclear age.
There were giant scale barriers to becoming a nuclear power, whereas launching a cyberattack requires only some coding capability, a laptop and an Internet connection.
We cannot afford to regard as normal the presence of injustice, inhumanity, and violence, including their verbal and cyber manifestations.
You may have heard of Black Friday and Cyber Monday. There's another day you might want to know about: Giving Tuesday. The idea is pretty straightforward. On the Tuesday after Thanksgiving, shoppers take a break from their gift-buying and donate what they can to charity.
A domain name is your address, your address on the Internet. We all have a physical address; we're all going to need an address in cyberspace. They're becoming increasingly important. I believe we'll get to the point where when you're born, you'll be issued a domain name.
I feel sort of really aware of how the... online cyber world has begun to take over reality.
Crises like the Mirai botnet can't be prevented by vague calls to protect our cybernetworks or platitudes about working with private industry. We need to be able to force recalls on consumer devices with massive security vulnerabilities.
I used to think that cyberspace was fifty years away. What I thought was fifty years away, was only ten years away. And what I thought was ten years away... it was already here. I just wasn't aware of it yet.
As the Homeland faces evolving threats from natural disasters, violent opportunists, malign cyber actors, and transnational criminal organizations, the mission of DHS is as critical as ever.
As cyberspace matures into a totally immersive experience, I'm betting it will turn out to be fully odor-enabled.
The public is eager for stories of True Cybercrime, and the media is happy to glamorize the subject. But when teenagers take the bait and live out our fantasies for us, we punish them for frightening us too much.
The landscape of the Net has changed; that cyberfrontier of the past has become a teeming city of people, transactions, and businesses.
I don't appreciate Internet cyber bullying at all. It's not fair. With me, it gets hard because I have four children. My 8 year old son reads lies about his father, when I'm his hero.
The Internet definitely could be a weapon of mass destruction - it's not going to come in a bomb, it's going to come as a cyberattack. It's pretty amazing to see what a small group of people can do if they really know how to control the universe.
Cyber criminals often operate through online forums, selling illicit goods and services, including tools that lower the barrier to entry for aspiring criminals and that can be used to facilitate malicious cyber activity.
We take all potential threats to public and private sector systems seriously and will continue to investigate and hold accountable those who pose a threat in cyberspace.
The FBI is engaged in a myriad of efforts to combat cyber threats, from improving threat identification and information sharing inside and outside of the government to developing and retaining new talent, to examining the way we operate to disrupt and defeat these threats.
We've created these Protected Voices videos to showcase the methods these adversaries might use, and to help campaigns practice good cyber hygiene, because the foundation of election security is cybersecurity.
Cybersecurity is a central part of the FBI's mission. It's one part of the broader safety net we try to provide the American people: not only safe data, safe personal information, but also safe communities, safe schools.
My view is that the cyber threat is bigger than any one government agency - or even the government itself. But the FBI brings a rare combination of scope and scale, experience, and tools to the mix. We investigate criminal activity like intrusions and cyber attacks, but we also investigate national security threats like foreign influence.
I would argue that in the cyber arena, the need for private sector partnership is higher than really anywhere else of any program we have. So, the reality is we couldn't do what we do without the private sector, and vice versa.
Our adversaries - terrorists, foreign intelligence services, and criminals - take advantage of modern technology to hide their communications; recruit followers; and plan, conduct, and encourage espionage, cyber attacks, or terrorism to disperse information on different methods to attack the U.S. homeland and to facilitate other illegal activities.
What was once a comparatively minor threat - people hacking for fun or for bragging rights - has turned into full-blown economic espionage and extremely lucrative cyber crime.
Terrorists in ungoverned spaces - both physical and cyber - readily disseminate propaganda and training materials to attract easily influenced individuals around the world to their cause. They motivate these individuals to act at home or encourage them to travel.