Roger Grimes

Columnist

Roger A. Grimes is an InfoWorld contributing editor. Roger holds over 40 computer certifications and has authored eight books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He currently runs eight honeypots to track hacker and malware behavior and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for Microsoft as a principal security architect.


6 lessons learned about the scariest security threats

These hard-earned lessons of a longtime IT security pro may save you from the fallout of advanced persistent threats

11 sure signs you've been hacked

Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned

7 sneak attacks used by today's most devious hackers

Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

True tales of (mostly) white-hat hacking

Stings, penetration pwns, spy games -- it's all in a day’s work along the thin gray line of IT security

11 signs your IT project is doomed

No senior buy-in, minimum spec targets, a 'nothing can go wrong' mentality -- here's how to sense demise before your IT project meets its ignominious end

14 dirty IT tricks, security pros edition

Beware these underhanded techniques for draining IT security budgets and avoiding accountability

IT's 9 biggest security threats

Hacking has evolved from a one-person crime of opportunity to an open market of sophisticated malware backed by crime syndicates and money launders

9 popular IT security practices that just don't work

The security products and techniques you rely on most aren't keeping you as secure as you think

10 crazy IT security tricks that actually work

IT security threats are constantly evolving. It's time for IT security pros to get ingenious

7 questions about the Mac malware scare

A few answers help clarify what the Mac Defender scareware plague really means for Mac users and administrators

Intrusion detection honeypots simplify network security

Low-cost, low-fuss honeypots are highly effective early-warning systems against external attacks and insider threats; KFSensor, HoneyPoint, and Honeyd offer safety, ease, and flexibility

Load More