There are many exceptions, but New York is a great place to start a career.
Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon.
A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted.
Companies spend millions of dollars on firewalls and secure access devices, and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer and operate computer systems
There is no patch for stupidity.
You can never protect yourself 100%. What you do is protect your self as much as possible and mitigate risk to an acceptable degree. You can never remove all risk.
Social engineering bypasses all technologies, including firewalls.
When you don't have standards, it's easier to exceed them.
Men who fear to make the sacrifice of love will have to fight
I've been a vegetarian, I've been a Paleo, and now I believe in the everything-in-moderation diet.
I could never be in a cult. For starters, they never accessorize properly. David Koresh had no fashion sense, Jim Jones wore leisure suits, and I don't care how charismatic Osama bin Laden was, an AK-47 and an insulin drip do not take the place of drop earrings or a well-placed brooch.