Roger A. Grimes

Columnist

Roger A. Grimes is an InfoWorld contributing editor. Roger holds more than 40 computer certifications and has authored eight books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He currently runs eight honeypots to track hacker and malware behavior and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for Microsoft as a principal security architect.


Moment of truth: Web browsers and the SHA-1 switch

Moment of truth: Web browsers and the SHA-1 switch

SHA-1 encryption is ending. Here's how your browser will react

5 ways President Trump may affect computer security

5 ways President Trump may affect computer security

You can expect the new administration to take full advantage of surveillance techniques, ease security regulations for business, and mandate more punishment for hackers

No, you still don't need an RFID-blocking wallet

No, you still don't need an RFID-blocking wallet

Criminals with RFID scanners roaming the streets stealing credit card numbers should be way down your list of worries

Is it real? The Trump-Russia server connection

Is it real? The Trump-Russia server connection

A recent report suggests a link between a server maintained by Trump's organization and another by Russia's Alfa Bank

How Clinton could have avoided the Wikileaks fiasco

How Clinton could have avoided the Wikileaks fiasco

Hillary Clinton's email server and her advisers' email accounts are no more or less vulnerable than most, but securing them would have been easy

17 essential tools to protect your online identity, privacy

17 essential tools to protect your online identity, privacy

From secure chips to anonymity services, here’s how to stay safe and private on the web

The only realistic plan to avoid DDoS disaster

The only realistic plan to avoid DDoS disaster

Emergencies like the Dyn DDoS attack will keep occurring. The only solution is a better, more secure internet

Which country has the best hackers: Russia or China?

Which country has the best hackers: Russia or China?

Both are notorious for high-profile attacks, advanced persistent threats, and theft of money or intellectual property. And the award goes to ...

10 decisions you'll face when deploying a honeypot

Set up a fake system as bait and you can cull invaluable information about potential threats. Here are the questions awaiting you in your honeypot adventure

6 security distractions derailing IT

6 security distractions derailing IT

IT isn't dumb, but it's pulled in so many different directions that completing even one worthy security project seems like a major victory

A quick fix for stupid password reset questions

A quick fix for stupid password reset questions

This ridiculous feature is a major vulnerability. If you're forced to use it, here's how to make it more secure

Load More