Roger A. Grimes

Columnist

Roger A. Grimes is a contributing editor. Roger holds more than 40 computer certifications and has authored eight books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He currently runs eight honeypots to track hacker and malware behavior and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for Microsoft as a principal security architect.

The 5 cyber attacks you're most likely to face

What is OAuth? What security pros need to know

What is OAuth? What security pros need to know

The OAuth open authorization framework allows websites and services to share assets among users. It is widely accepted, but be aware of its vulnerabilities.

How to protect personally identifiable information under GDPR

How to protect personally identifiable information under GDPR

The EU's General Data Protection Regulation requires companies to protect the privacy of their EU customers. Here's what you need to know.

IT's 9 biggest security threats

IT's 9 biggest security threats

As this list of the biggest security threats shows, hacking has evolved from a one-person crime of opportunity to an open market of sophisticated malware backed by crime syndicates and money launderers.

The 10 Windows group policy settings you need to get right

The 10 Windows group policy settings you need to get right

Configure these 10 group policy settings carefully, and enjoy better Windows security across the office

12 signs you've been hacked -- and how to fight back

12 signs you've been hacked -- and how to fight back

Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned.

'Jump boxes' and SAWs improve security, if you set them up right

'Jump boxes' and SAWs improve security, if you set them up right

The concept of a traditional “jump box”, a secure computer that all admins first connect to before launching any administrative task or use as an origination point to connect to other servers, has morphed into an even more...

All you need to know about the move from SHA-1 to SHA-2

All you need to know about the move from SHA-1 to SHA-2

The PKI industry recommends that every SHA-1 enabled PKI move to the vastly more secure SHA-2. Here's why and how.

Your secure developer workstation solution is here, finally!

Your secure developer workstation solution is here, finally!

Developer workstations are high-value targets for hackers and often vulnerable. Now you can protect them using concepts borrowed from securing system admin workstations.

The best identity management advice right now

The best identity management advice right now

We've never been closer to getting pervasive, global identities. And with 2FA/MFA, you get all of the benefit with less of the risk.

How computer security pros hack the hackers

How computer security pros hack the hackers

If you want to meet a really smart hacker, talk to a cybersecurity defender. These talented professionals are working every day to make cybercrime harder and less lucrative.

6 reasons chip hacks will become more popular

6 reasons chip hacks will become more popular

Code embedded in hardware has vulnerabilities and it's harder to patch. That will make it a target for hackers.

Load More