
Roger A. Grimes
Columnist
Roger A. Grimes is a contributing editor. Roger holds more than 40 computer certifications and has authored ten books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He specializes in protecting host computers from hackers and malware, and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for KnowBe4 as the Data-Driven Defense Evangelist and is the author of Cryptography Apocalypse.
Massive 'Lurid' APT attack targets dozens of government agencies
Using basic techniques, hackers managed to infiltrate networks of space-related agencies, diplomatic organizations, and more
Certificate hacks: PKI didn't fail us, humans did
After latest attack, GlobalSign stopped issuing SSL certificates. But the real problem is that few pay attention to warnings anyway
Morto worm reveals how bad IT is at passwords
Malware responsible for spike in unauthorized RDP traffic affects Windows PCs and servers globally
Chinese military hacking caught on video? Not so fast
Take it from a security instructor: The Chinese military's instructional video may show training, not hacking
Apple security under attack: The view from Windows
Apple has much to learn about securing an operating system -- and it could learn it from Microsoft
Why McAfee's dire security report rings true
Yet another study concludes that advanced persistent threats have compromised the vast majority of enterprises. When will we do something about it?
Sorry, but the TDL botnet is not 'indestructible'
Malware and alarmism over its proliferation are nothing new -- and the latest boot-sector rootkit will be cured soon enough
Free and easy security scanner for IIS, ASP.Net, SQL, and Windows servers
Defeat hackers by running the Microsoft Web Application Configuration Analyzer with the same security checks that Microsoft uses on its own servers
7 questions about the Mac malware scare
A few answers help clarify what the Mac Defender scareware plague really means for Mac users and administrators
KFSensor: Sweet Windows honeypot
Longtime best-of-breed intrusion detection solution remains feature-rich, easy to use, and actively maintained
Intrusion detection on the cheap: Roll your own honeypot
Back up your network security defenses by turning an old PC into an early-warning system for malware and attacks

Honeyd: The open source honeypot
The early leader in intrusion detection honeypots is still around, flexible as ever, but a bit dated.
HoneyPoint: A honeypot for Windows, Linux, or Mac OS X
HoneyPoint Security Server combines multiplatform support, unique features, and limitations
Intrusion detection honeypots simplify network security
Low-cost, low-fuss honeypots are highly effective early-warning systems against external attacks and insider threats; KFSensor, HoneyPoint, and Honeyd offer safety, ease, and flexibility
The InfoWorld expert guide to Windows 7 security
How to configure Microsoft's new Windows operating system to beat malware and keep data secure
The InfoWorld expert guide to Web browser security
Today's Web browsers have different security pros and cons, and none offers a magic bullet against threats. Here's how to keep your Web surfing secure
Thin client computing: Central management, anywhere access
Deployed correctly, Citrix XenApp can deliver on the remote desktop promise
Fighting today's malware
How bad is it? Worse than you think. Here's what the new breed of malware looks like -- and what you can do to stop it
Log management review: ArcSight Logger
ArcSight Logger 4 meets all the requirements of enterprise-grade log management, with plenty of flexibility and options