Roger A. Grimes

Columnist

Roger A. Grimes is a contributing editor. Roger holds more than 40 computer certifications and has authored ten books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He specializes in protecting host computers from hackers and malware, and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for KnowBe4 as the Data-Driven Defense Evangelist.

Using a password manager: 7 pros and cons

Google makes good on promise to remove some Symantec PKI certificates

Google makes good on promise to remove some Symantec PKI certificates

If you get this digital certificate error using Chrome, then Google now considers that website's Symantec PKI certificate untrustworthy.

Career advice: Good enough security trumps best security

Career advice: Good enough security trumps best security

The realization that most of the world doesn’t want the best security will help you advance in your security career.

How to reach that person who will click on anything

How to reach that person who will click on anything

There's always that one person who falls for every phishing scam. This is how you break them of that habit.

Experience an RDP attack? It’s your fault, not Microsoft’s

Experience an RDP attack? It’s your fault, not Microsoft’s

Follow Microsoft's basic security guidelines for Remote Desktop Protocol and you'll shut down hackers who try to exploit it.

Is your security operations center TTP0?

Is your security operations center TTP0?

The new TTP0 community wants to do for SOCs what OWASP has done for web security. It will help CISOs improve their threat intelligence and threat hunting capabilities as well.

How Microsoft's Controlled Folder Access can help stop ransomware

How Microsoft's Controlled Folder Access can help stop ransomware

Part of Windows Defender in recent updates of Windows 10 and Windows Server, Controlled Folder Access can prevent malware from accessing or changing designated files.

The fix for IT supply chain attacks

The fix for IT supply chain attacks

Bloomberg's China spy chip story underscores weaknesses in computer supply chain security. The solution needs to be global.

Why I don’t believe Bloomberg’s Chinese spy chip report

Why I don’t believe Bloomberg’s Chinese spy chip report

China can and has stolen the information it wants from US companies without using secretly embedded hardware, so why would it jeopardize its massive semiconductor industry?

What is the future of authentication? Hint: It’s not passwords, passphrases or MFA

What is the future of authentication? Hint: It’s not passwords, passphrases or MFA

Passphrases and MFA are not password saviors. Ultimately, authentication will rely on algorithms to determine user identity and detect fraudulent actions.

Are long passphrases the answer to password problems?

Are long passphrases the answer to password problems?

Passphrases can be more secure than passwords, but there are limitations and hackers will eventually master cracking them.

The best password advice right now

The best password advice right now

Short and crackable vs. long, complex and prone to reuse? The password debate rages on.

Load More