Roger A. Grimes

Columnist

Roger A. Grimes is an InfoWorld contributing editor. Roger holds more than 40 computer certifications and has authored eight books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He currently runs eight honeypots to track hacker and malware behavior and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for Microsoft as a principal security architect.

4 basic security facts everyone should know

Spotted! 9 signs of a malicious download

Spotted! 9 signs of a malicious download

You've heard the advice: Don't download or run software you're unsure of. Here's a quick review of the warning signs to stop you from taking unnecessary risks

11 signs your kid is hacking -- and what to do about it

11 signs your kid is hacking -- and what to do about it

Here’s how to find out if your child is involved in malicious online activity -- before the authorities do

11 essential data security tips for travelers

11 essential data security tips for travelers

Your data and privacy are never more at risk than when you travel; here's how to protect them

Not so fast: Some security defaults shouldn't change

Not so fast: Some security defaults shouldn't change

Contrary to popular belief, changing default settings doesn't always improve security -- and often backfires

Interview with a Craigslist scammer

Interview with a Craigslist scammer

Ever wondered what motivates people who swindle others on Craigslist? Read on for a fascinating look into the mind of a small-time criminal

Big data will fix internet security ... eventually

Big data will fix internet security ... eventually

Security analytics have been with us for a while, but with the latest tech, it's much easier to detect malicious attacks

 The days of long, complicated passwords are over

The days of long, complicated passwords are over

As threats evolve, so does the advice on creating passwords to foil the bad guys. Here are the latest recommendations

Zero-days aren’t the problem -- patches are

Zero-days aren’t the problem -- patches are

Everyone fears the zero-day exploit. But old, unpatched vulnerabilities still provide the means for malicious hackers to carry out the vast majority of hacks

Effective IT security habits of highly secure companies

Effective IT security habits of highly secure companies

You're far more vulnerable to hackers than you think. Here are the secrets to staying secure

5 steps to stronger data security

5 steps to stronger data security

The old cliche is true: Your organization's most precious asset is its data. Five basic security building blocks can ensure its safety

Defend yourself! Build a cyber security database

Defend yourself! Build a cyber security database

Attackers have all kinds of data about the threat landscape -- and about your organization, if it happens to be a target. Now's the time to arm yourself with data, too

Load More