Winn’s Predictions & More

Winn has been successfully predicting major events in cyber security since the 1980s, and so far, all of his predictions have been spot on. Recently updated in July 2012, check out Winn’s latest timeline for a glimpse into the future of InfoWar and Cyber Terrorism. Last Updated July 2012 “Electronic Pearl Harbor” – Winn Schwartau …

The BYOD Mobile Security Spectrum: A Taxonomy

In the July 2012 “Consumerization of IT” issue of The Innovator journal, published by BITS, Winn explains his view of the Mobile Security spectrum from least to most secure, and gives advice for enterprises who want to be as safe as possible in today’s technical world. Download PDF of Article Read the Article Here

Security & the Mobile Enterprise

Winn wrote an article for the 27th issue of (IN)SECURE Magazine called “A Brief History of Security and Mobile Enterprise”. “IT architecture is a never-ending exercise in migration – a centric vs. noncentric flux that can never seem to make up its mind. And for decades, security – most assuredly the bastard step-child …

The Tweety Bird Got Ate

The U.S. Department of Defense is banning Twitter. All social networking. Or trying to. Or maybe not. The debate is on. The same pro and con arguments that affect the defence establishment are currently the source of many debates within countless private and public organizations that have concern for their own security. You know that Twitter, Facebook, …

The Road Warrior Option

We’re all out there traveling through airports, Internet cafes, hotel lobbies and conference centers. If that wasn’t difficult enough, we are expected to ‘stay in touch’, get some work done – and most notably – do it securely. Securely. Our various companies have differing policies and approaches to mobile security; from none at all (ugh!) …

China Unrestricted

I just sent this story to acquaintances who disclosed a fair amount of these scenarios to me several years ago. In his team’s penetration studies, all roads pointed to Beijing, but I was under NDA not to tell, names, etc. But, the short sanitized version from Feb 2005 is: Major utility companies POWNED! Banks…you, too. Communications …

Lying to Hackers is OK By Me

“All warfare is based on deception.” – Sun Tzu “In war (conflict), truth is so precious, it must be protected by a bodyguard of lies.” – Winston Churchill “Make a noise in the East and attack in the West.” – Anonymous Chinese I believe in lying. Sort of. Let me explain. The bad guys will do anything they can to get you. You know …

Cyber-Christ Meets Lady Luck

DefCon II: Las Vegas – July 22-24, 1994 Las Vegas connotes radically different images to radically different folks. The Rat Pack of Sinatra, Dean Martin and Sammy Davis Jr. elicits up the glistening self-indulgent imagery of Vegas’ neon organized crime in the ’50’s (Ocean’s Eleven displayed only minor hacking skills.) Then …