Pretentiousness repels but authenticity attracts, and vulnerability is the pathway to intimacy.
If we want to live and love with our whole hearts, and if we want to engage with the world from a place of worthiness, we have to talk about the things that get in the way- especially shame, fear and vulnerability
If I can forgive the attachment in myself and open to the vulnerability that's underneath it, then rather than fixating on another person to satisfy my need, I'm actually going right to where the needs come from and able to bring a real healing.
A lot of countries have advanced capabilities. And given the vulnerabilities of our infrastructure and our economies to digital platforms, we have to be careful in making sure that this doesn't become a lawless, low-level battlefield.
I do think - you look at actually what WikiLeaks came out with, most of it was just gossipy interest, except for like this Doug Band memo from a Clinton crony in black and white who explained the Clinton Foundation was a profit center for Bill Clinton and people around him.The Russians didn't make that up, that was all Hillary's [Clinton] vulnerability her own.
Putting women's traditional needs at the center of social planning is not reverse sexism. It's the best way to reverse the increasing economic vulnerability of men and women alike.
A zero-day exploit is a method of hacking a system. It's sort of a vulnerability that has an exploit written for it, sort of a key and a lock that go together to a given software package. It could be an internet web server. It could be Microsoft Office. It could be Adobe Reader or it could be Facebook.
People have to be free to investigate computer security. People have to be free to look for the vulnerabilities and create proof of concept code to show that they are true vulnerabilities in order for us to secure our systems.
When the United States cannibalize dollars from the defensive business of the NSA, securing our communications, protecting our systems, patching zero-day vulnerabilities, and instead we're giving those dollars to be used for creating new vulnerabilities in our systems so that they can surveil us and other people abroad who use the same systems.
The United States need to be focusing more on creating a more secure, more reliable, more robust, and more trusted internet, not one that's weaker, not one that relies on this systemic model of exploiting every vulnerability, every threat out there.
If the United States is promoting the development of exploits, of vulnerabilities, of insecurity in this critical infrastructure, and we're not fixing it when we find it, instead we put it on the shelf so we can use it the next time we want to launch an attack against some foreign country. We're leaving ourselves at risk.
You can show a guy sort of peeking over the wall, you can see a guy tunneling underneath, you can see a guy going through the front door. All of those, in cyber terms, are vulnerabilities, because it's not that you have to look for one hole of a specific type. It's the whole paradigm.
One's strongest asset is simultaneously his point of strongest vulnerability.
I've come to this belief that, if you show me a woman who can sit with a man in real vulnerability, in deep fear, and be with him in it, I will show you a woman who, A, has done her work and, B, does not derive her power from that man. And if you show me a man who can sit with a woman in deep struggle and vulnerability and not try to fix it, but just hear her and be with her and hold space for it, I'll show you a guy who's done his work and a man who doesn't derive his power from controlling and fixing everything.
If someone lies down and invites you to trample upon him, you are a remarkable individual if you decline the invitation.
If you are strong you can take a punch and not flinch, but if you have a sore spot, a nudge on that sore spot will make you scream. Muslims committed the huge blunder of revealing their vulnerability. Now the world knows what hurts them. When you find your opponent's weak spot, it is exactly where you want to hit him.
Revenge tries to solve the problem of vulnerability. If I strike back, I transfer vulnerability from myself to the other. And yet by striking back I produce a world in which my vulnerability to injury is increased by the likelihood of another strike. So it seems as if I'm getting rid of my vulnerability and instead locating it with the other, but actually I'm heightening the vulnerability of everyone and I'm heightening the possibility of violence that happens between us.
There's vulnerability - so I have to make sure the audience is certain that I know what I'm doing. There's vulnerability there because my heart is open, but at the same time I definitely have a lot of "weapons" at my disposal. I have all the language, I have all of the moment - I have all of that to spar with somebody, to take anything on.
I think that one of the things is that, if you are going to decide to be a painter, you have got to decide that you are not going to be afraid of making a fool of yourself. I think another thing is to be able to find subjects which really absorb you to try and do. I feel that without a subject you automatically go back into decoration because you haven't got the subject which is always eating into you to bring it back - and the greatest art always returns you to the vulnerability of the human situation.
When a woman forsakes her vulnerability because she's been hurt or because she lives in a dangerous world or doesn't want to be used, she loses something essential about being a woman.
I found my mind has changed over the last years. Different vulnerabilities - things that I was never vulnerable to before I am now. And vice-versa. Things I was vulnerable to then are like water off a duck's back. I have a lot less fear. I think I'm getting more determined.
I think that is funny to say because I've always loved her work and her strength and vulnerability, and the intensity of Evan's [Rachel Wood] performances. And to know her as a friend, know her as someone who we just have fun, whatever, and then see how present she is when she's working and how powerful she is. It was really awesome to get to sort of go into this different dimension with each other.
I will then ask for a plan to immediately protect those vulnerabilities and then fix them.At the same time, we will invest heavily in offensive cyber capabilities to disrupt our enemies, including terrorists who rely heavily on internet communications.
More connections to more devices means more vulnerabilities.
...it's what charity truly means, that compassion for each other's vulnerability
Follow AzQuotes on Facebook, Twitter and Google+. Every day we present the best quotes! Improve yourself, find your inspiration, share with friends
or simply: