

Roger A. Grimes
Columnist
Roger A. Grimes is a contributing editor. Roger holds more than 40 computer certifications and has authored ten books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He specializes in protecting host computers from hackers and malware, and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for KnowBe4 as the Data-Driven Defense Evangelist and is the author of Cryptography Apocalypse.

How to protect PII under GDPR
The EU's General Data Protection Regulation requires companies to protect the privacy of their EU customers. That means keeping personally identifiable information (PII) safe. Here's what you need to know.

15 signs you've been hacked—and how to fight back
Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned.

9 types of malware and how to recognize them
Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit

11 types of hackers and how they will harm you
Understanding the different types of hackers, what motivates them, and the malware they use can help you identify the attacks you are most likely to face and how to properly defend yourself and your organization.
Has the quantum crypto break already happened?
Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe.

5 steps to a successful red team engagement
You want red team pen testers to find the vulnerabilities attackers are most likely to use. Here's how.

Dial 211 for cyberattacks
US consumers and businesses in a few states can now dial 211 for help when victimized by cybercrime. What's needed is a nationwide rollout.

8 questions to answer before paying a ransomware demand
Consider these factors before deciding to pay a ransom after a ransomware attack. Better yet, know where you stand before one hits you.

10 risk factors no one talks about
These risk factors might not show up on an official risk assessment report, but every security professional should be thinking about them.

5 reasons users hate cybersecurity awareness training, and how to make them love it
If you want your security awareness training program to be effective, address these common user complaints.

8 ways your patch management policy is broken (and how to fix it)
These eight patching best practices mistakes get in the way of effective risk mitigation. Here's how to fix them.