Roger A. Grimes

Columnist

Roger A. Grimes is an InfoWorld contributing editor. Roger holds more than 40 computer certifications and has authored eight books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He currently runs eight honeypots to track hacker and malware behavior and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for Microsoft as a principal security architect.

Got microservices? You'd better secure them

Q&A: RSA crypto pioneer Adleman keeps pushing the limits

Q&A: RSA crypto pioneer Adleman keeps pushing the limits

Dr. Leonard Adleman tells InfoWorld all about RSA's big breakthrough, why DNA works great for computing, and our coming cyberwar risk

Better authentication: Go get 'em, FIDO

Better authentication: Go get 'em, FIDO

Security standards always seem to languish in committee, but the FIDO Alliance breaks the mold, rolling out new, usable authentication systems at a rapid clip

The real reason we can't secure the internet

The real reason we can't secure the internet

We can surmount the technical and human obstacles to a dramatically more secure internet, but one factor stands in the way

Maybe security isn't going to get better after all

Maybe security isn't going to get better after all

Is that light at the end of the tunnel? Or is a train coming?

Too many contractors spoil the business

Too many contractors spoil the business

Contractors have their uses, but companies that opt for them by default lose the valuable institutional knowledge that permanent employees can bring

Why it's so hard to prosecute cyber criminals

Why it's so hard to prosecute cyber criminals

The bad guys are wreaking havoc. Why can't they be brought to justice?

3 clues to spotting a spam scam

3 clues to spotting a spam scam

The notice looked real at first -- but turned out to be an obvious scam. Unraveling its origins offered an object lesson in how not to get suckered

Moment of truth: Web browsers and the SHA-1 switch

Moment of truth: Web browsers and the SHA-1 switch

SHA-1 encryption is ending. Here's how your browser will react

5 ways President Trump may affect computer security

5 ways President Trump may affect computer security

You can expect the new administration to take full advantage of surveillance techniques, ease security regulations for business, and mandate more punishment for hackers

No, you still don't need an RFID-blocking wallet

No, you still don't need an RFID-blocking wallet

Criminals with RFID scanners roaming the streets stealing credit card numbers should be way down your list of worries

Is it real? The Trump-Russia server connection

Is it real? The Trump-Russia server connection

A recent report suggests a link between a server maintained by Trump's organization and another by Russia's Alfa Bank

Load More