Winn’s Predictions & More

Winn has been successfully predicting major events in cyber security since the 1980s, and so far, all of his predictions have been spot on. Recently updated in July 2012, check out Winn’s latest timeline for a glimpse into the future of InfoWar and Cyber Terrorism. Last Updated July 2012 “Electronic Pearl Harbor” – Winn Schwartau …

The BYOD Mobile Security Spectrum: A Taxonomy

In the July 2012 “Consumerization of IT” issue of The Innovator journal, published by BITS, Winn explains his view of the Mobile Security spectrum from least to most secure, and gives advice for enterprises who want to be as safe as possible in today’s technical world. Download PDF of Article View Entire Journal at BITS.org

Bad Hackers Turned Good Get Top Spot

Winn was featured in an article for Bloomberg about the newest development in the hiring process for high-profile companies: “scouring hackathons.” “We need to find a way to allow the most skilled people in the world to land a job, instead of going to work for the mob,” said Winn Schwartau, a security consultant in Nashville, Tennessee, …

DHS’s GFIRST 2011 Closing Keynote Address

Winn Schwartau’s closing keynote at DHS’s GFIRST 2011 conference shocked a few thinkers, rattled some pre-conceived notions, and offered unique perspective and insight! The things that scare the living IT out of Winn include our reliance on tech, cyberwar 4g, our failure to profile, and much more. Watch the whole presentation above!

IT Admins Gone Wild!

Winn has been featured in an article at InfoWorld titled “IT Admins Gone Wild: 5 Rogues to Watch Out For.” Years of experience in the security world allowed him to add a real-life situation to the mix. Winn Schwartau, chairman of smartphone security company Mobile Active Defense, says he was doing independent consulting for a financial services …

Ringing Alarms About Smartphone Vulnerabilities

When there are as many as 20 billion mobile devices in the world, what do we do about the bad guys? Winn has some ideas, which he shared at the Air Force Association’s CyberFutures symposium. There are more than 500,000 software applications available from name brand “app stores” but most are not properly vetted, he said, noting that more than …

Securing the Enterprise Against Smartphones

In light of the conclusion of the 2011 RSA Conference, Streaming Media‘s Tim Siglin has written an article about a topic that was discussed hotly there: the security concerns involved with using smartphones (and other devices) on an enterprise network. Winn has something to say about that! Representing Mobile Active Defense as the company’s …

6 Enterprise Security Leaks

Many corporations feel confident in their security measures, but more often than not, “security holes” are left open for the bad guys to sneak in. John Brandon has listed 6 of the biggest security leaks found in companies for ARN, and enlisted Winn to help explain a couple of them. P2P networks just won’t go away. In a large company, …

Security & the Mobile Enterprise

Winn wrote an article for the 27th issue of (IN)SECURE Magazine called “A Brief History of Security and Mobile Enterprise”. “IT architecture is a never-ending exercise in migration – a centric vs. noncentric flux that can never seem to make up its mind. And for decades, security – most assuredly the bastard step-child …

5 Reasons IT Pros Should Be Paranoid

Over at InfoWorld, Dan Tynan compiled a list of reasons why IT professionals should be paranoid (as if they didn’t have enough reasons already!). Winn talked with him about the risk of mobile devices. “Mobile devices are coming at us faster than any technology since the rock,” says Winn Schwartau, chairman of the board for Mobile Application …