Roger A. Grimes

Columnist

Roger A. Grimes is a contributing editor. Roger holds more than 40 computer certifications and has authored ten books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He specializes in protecting host computers from hackers and malware, and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for KnowBe4 as the Data-Driven Defense Evangelist and is the author of Cryptography Apocalypse.

Essential certifications for smart security pros

A free, nearly foolproof way to check for malware

A free, nearly foolproof way to check for malware

How to scan every running process on your system for malware in seconds, without installing anti-malware software

Why phishing attacks are nastier than ever

Why phishing attacks are nastier than ever

Forget Nigerian princes -- today’s spearphishing is sophisticated business, fooling even the most seasoned security pros

10 reasons why phishing attacks are nastier than ever

10 reasons why phishing attacks are nastier than ever

Forget Nigerian princes -- today’s spearphishing is sophisticated business, fooling even the most seasoned security pros.

Tanium review: Endpoint security at the speed of now

Tanium review: Endpoint security at the speed of now

Tanium Endpoint Platform draws on fast peer-to-peer communications to answer queries of managed clients within seconds.

10 security technologies destined for the dustbin

10 security technologies destined for the dustbin

Systemic flaws and a rapidly shifting threatscape spell doom for many of today’s trusted security technologies.

10 security technologies destined for the dustbin

10 security technologies destined for the dustbin

Systemic flaws and a rapidly shifting threatscape spell doom for many of today’s trusted security technologies

10 terrifying extreme hacks

10 terrifying extreme hacks

Truly innovative or thought-provoking hacks are few and far between, but these extreme hacks have earned the grudging respect of security experts.

Be paranoid: 10 terrifying extreme hacks

Be paranoid: 10 terrifying extreme hacks

Nothing is safe, thanks to the select few hacks that push the limits of what we thought possible.

6 hard truths security pros must learn to live with

6 hard truths security pros must learn to live with

Caveat emptor: Security solutions will always fall short in addressing the fundamental flaws of securing IT systems.

10 security mistakes that will get you fired

10 security mistakes that will get you fired

From killing critical business systems to ignoring a critical security event, these colossal slip-ups will get your career in deep water quick.

The BadUSB exploit is deadly, but few may be hit

It's a case of good news/bad news with the BadUSB firmware exploit.

Load More