Roger A. Grimes

Columnist

Roger A. Grimes is a contributing editor. Roger holds more than 40 computer certifications and has authored ten books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He specializes in protecting host computers from hackers and malware, and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for KnowBe4 as the Data-Driven Defense Evangelist.

Be paranoid: 10 terrifying extreme hacks

Be paranoid: 10 terrifying extreme hacks

Nothing is safe, thanks to the select few hacks that push the limits of what we thought possible

6 hard truths security pros must learn to live with

6 hard truths security pros must learn to live with

Caveat emptor: Security solutions will always fall short in addressing the fundamental flaws of securing IT systems

7 Warning Signs an Employee Has Gone Rogue

7 Warning Signs an Employee Has Gone Rogue

Trust and IT go hand in hand. Here are the red flags to watch for before you get burned

10 Security Mistakes That Will Get You Fired

10 Security Mistakes That Will Get You Fired

From killing critical business systems to ignoring a critical security event, these colossal slip-ups will get your career in deep water quick

The BadUSB Exploit is Deadly, But Few May be Hit

The BadUSB Exploit is Deadly, But Few May be Hit

It's a case of good news/bad news with the BadUSB firmware exploit

11 Signs You've Been Hacked -- and How to Fight Back

Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned

Security-Vendor Snake Oil: 7 Promises That Don't Deliver

Beware bold promises from a multibillion-dollar industry that can't prevent your IT systems from being routinely hacked.

6 Lessons Learned About the Scariest Security Threats

Advanced persistent threats have garnered a lot of attention of late, deservedly so. APTs are arguably the most dangerous security concern for business organizations today, given their targeted nature.

7 Sneak Attack Used By Today's Most Devious Hackers

Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users.

7 Sneak Attacks Used By Today's Most Devious Hackers

Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users.

11 Signs Your IT Project is Doomed

11 Signs Your IT Project is Doomed

No senior buy-in, minimum spec targets, a 'nothing can go wrong' mentality -- here's how to sense demise before your IT project meets its ignominious end.

True Tales of (Mostly) White-Hat Hacking

Stings, penetration pwns, spy games -- it's all in a day's work along the thin gray line of IT security.

11 Signs Your IT Project is Doomed

The IT world is no stranger to projects that go down in flames. In fact, anyone who has had the unenviable pleasure of participating in a failed IT effort likely sensed its demise well before the go-live date. That sixth sense is...

14 Dirty IT Tricks

The IT security world is full of charlatans and wannabes and all of us have been "advised" by at least one of them.

9 Popular IT Security Practices That Just Don't Work

The security products and techniques you rely on most aren't keeping you as secure as you think.

10 Crazy IT Security Tricks That Actually Work

IT security threats are constantly evolving. It's time for IT security pros to get ingenious.

7 Questions About the Mac Malware Scare

A few answers help clarify what the MacDefender scareware plague really means for Mac users and administrators

Expert Guide to Windows 7 Security

How to configure Microsoft's new Windows operating system to beat malware and keep data secure.

Thin Client Computing: Central Management, Anywhere Access

Deployed correctly, Citrix XenApp can deliver on the remote desktop promise.

Fighting Today's Malware

How bad is it? Worse than you think. Here's what the new breed of malware looks like -- and what you can do to stop it

Load More