Roger A. Grimes

Columnist

Roger A. Grimes is an InfoWorld contributing editor. Roger holds more than 40 computer certifications and has authored eight books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He currently runs eight honeypots to track hacker and malware behavior and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for Microsoft as a principal security architect.

Vastly improve your IT security in 2 easy steps

6 security essentials the CIA forgot

6 security essentials the CIA forgot

Good security isn't magic. Common-sense measures could have stopped all those secrets from being revealed and damaging the agency

4 strategies to root out your security risks

4 strategies to root out your security risks

To defend yourself, you must first understand the security flaws that let bad guys exploit your environment

Red alert! Beware of insiders bearing APTs

Red alert! Beware of insiders bearing APTs

Big enterprises worry about APTs -- and employees who may be using them to engage in corporate espionage. These measures can help you catch the perps

Build your security defense on data, not guesswork

Build your security defense on data, not guesswork

Stop obsessing about the latest overhyped security threats. Delve into your own data about successful attacks on your organization first—and defend accordingly

Nowhere to hide: 9 new hacks coming to get you

Nowhere to hide: 9 new hacks coming to get you

The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm

Prepare for the smart bot invasion

Prepare for the smart bot invasion

We all know about the havoc wreaked by malicious bots, but soon, we'll have to deal with 'good' bots. How do you tell the two apart?

Fretting over fake news? It's only going to get worse

Fretting over fake news? It's only going to get worse

Soon, not even experts will be able to tell the difference between fraudulent and genuine content. Ultimately, it comes down to the reputation of whoever created it

Sniff out and kick out Windows malware for free

Sniff out and kick out Windows malware for free

Like it or not, your PC is susceptible to malware. These videos will teach you how to locate the bad stuff, then remove it from your system

Better security through obscurity? Think again

Better security through obscurity? Think again

Hackers may not target obscure apps as often as popular software, but your systems still won't be much safer

The evolution of (and solution to) ransomware

The evolution of (and solution to) ransomware

Ransomware has become the scourge of the internet 28 years after it first appeared. Here's how to prevent infection and recover if you're hit

Got microservices? You'd better secure them

Got microservices? You'd better secure them

Our modern world of containers and microservices presents new challenges that open new vulnerabilities if left unaddressed

Load More