Roger A. Grimes

Columnist

Roger A. Grimes is an InfoWorld contributing editor. Roger holds more than 40 computer certifications and has authored eight books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He currently runs eight honeypots to track hacker and malware behavior and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for Microsoft as a principal security architect.

Foiled! 15 tricks to hold off the hackers

Bash Bunny: Big hacks come in tiny packages

Bash Bunny: Big hacks come in tiny packages

With new hardware hacking devices, it's absurdly easy to attack organizations through the USB port of any computer on a network

9 superheroes for crack security teams

9 superheroes for crack security teams

Want to beat the odds when meeting your next security challenge? Security teams work best when these roles are filled

Why we need to encrypt everything

Why we need to encrypt everything

Many major websites already encrypt by default. Here’s why encryption and multifactor authentication should be everywhere

Abuse, theft, exposure: What's in store for your web history

Abuse, theft, exposure: What's in store for your web history

We've lost more than personal privacy now that ISPs can now collect and sell our browsing data

Free public certificate authorities: Nice idea, big flaw

Free public certificate authorities: Nice idea, big flaw

Certificate authorities such as Let's Encrypt attempt to provide a valuable service for all. But there's a serious problem with what they offer

Vastly improve your IT security in 2 easy steps

Vastly improve your IT security in 2 easy steps

Losing the battle against the bad guys? Keep your software patched and defend against social engineering, and you might start winning a few

6 security essentials the CIA forgot

6 security essentials the CIA forgot

Good security isn't magic. Common-sense measures could have stopped all those secrets from being revealed and damaging the agency

4 strategies to root out your security risks

4 strategies to root out your security risks

To defend yourself, you must first understand the security flaws that let bad guys exploit your environment

Red alert! Beware of insiders bearing APTs

Red alert! Beware of insiders bearing APTs

Big enterprises worry about APTs -- and employees who may be using them to engage in corporate espionage. These measures can help you catch the perps

Build your security defense on data, not guesswork

Build your security defense on data, not guesswork

Stop obsessing about the latest overhyped security threats. Delve into your own data about successful attacks on your organization first—and defend accordingly

Nowhere to hide: 9 new hacks coming to get you

Nowhere to hide: 9 new hacks coming to get you

The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm

Load More