Roger A. Grimes

Columnist

Roger A. Grimes is an InfoWorld contributing editor. Roger holds more than 40 computer certifications and has authored eight books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He currently runs eight honeypots to track hacker and malware behavior and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for Microsoft as a principal security architect.

5 steps to stronger data security

Defend yourself! Build a cyber security database

Defend yourself! Build a cyber security database

Attackers have all kinds of data about the threat landscape -- and about your organization, if it happens to be a target. Now's the time to arm yourself with data, too

You too? Who's on the hacker hit list

You too? Who's on the hacker hit list

You don’t need to carry the keys to the enterprise network to have a malicious hacker tail you. Here’s who’s at risk and what to do about it

Tick-tock: Time is running out to move from SHA-1 to SHA-2

Tick-tock: Time is running out to move from SHA-1 to SHA-2

Stop procrastinating and make the switch from SHA-1 to SHA-2. You may already be getting errors -- and in 2017 things will get a lot worse

The dark side of biometric identification

The dark side of biometric identification

Authorities are using your fingerprints, your face, and even your DNA to authenticate you. If you think that will stop cyber fraud, think again

Hands-on: Go (almost) anonymous on the Internet with Anonabox

Hands-on: Go (almost) anonymous on the Internet with Anonabox

Want to elude snooping at home and abroad? The preconfigured Anonabox router is easier to use than Tor software alone and provides greater protection

Behold the glorious future -- with the same old security

Behold the glorious future -- with the same old security

From delivery drones to implanted medical monitors, technology is about to become more incredible -- but not more secure

Digital certificates are helping deliver malware

Digital certificates are helping deliver malware

When digital certs go bad, whom can you trust? Follow these procedures to get as much assurance as you can

Spread honeypots over your defense plan

Spread honeypots over your defense plan

Deployed properly, a honeypot catches intruders like flies to, well, you know what. They deliver enormous value for a modicum of up-front effort

Get hired as a security pro: Insider tips

Get hired as a security pro: Insider tips

Qualifications are one thing. The characteristics that make a security job candidate great are another

The 10 Windows group policy settings you need to get right

The 10 Windows group policy settings you need to get right

Configure these 10 group policy settings carefully, and enjoy better Windows security across the office

The best new security features of Windows 10

The best new security features of Windows 10

With deep protection at its core, Windows 10 is the most secure Windows ever, from virtualization-based security to Windows Hello to Enterprise Data Protection

Load More