Roger A. Grimes

Columnist

Roger A. Grimes is a contributing editor. Roger holds more than 40 computer certifications and has authored ten books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He specializes in protecting host computers from hackers and malware, and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for KnowBe4 as the Data-Driven Defense Evangelist.

Essential certifications for smart security pros

A free, nearly foolproof way to check for malware

A free, nearly foolproof way to check for malware

How to scan every running process on your system for malware in seconds, without installing anti-malware software

Why phishing attacks are nastier than ever

Why phishing attacks are nastier than ever

Forget Nigerian princes -- today’s spearphishing is sophisticated business, fooling even the most seasoned security pros

Tanium review: Endpoint security at the speed of now

Tanium review: Endpoint security at the speed of now

Tanium Endpoint Platform draws on fast peer-to-peer communications to answer queries of managed clients within seconds.

10 security technologies destined for the dustbin

10 security technologies destined for the dustbin

Systemic flaws and a rapidly shifting threatscape spell doom for many of today’s trusted security technologies.

10 terrifying extreme hacks

10 terrifying extreme hacks

Truly innovative or thought-provoking hacks are few and far between, but these extreme hacks have earned the grudging respect of security experts.

external url

11 signs you've been hacked -- and how to fight back

Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned

Security-vendor snake oil: 7 promises that don't deliver

Beware bold promises from a multibillion-dollar industry that can't prevent your IT systems from being routinely hacked

7 sneak attacks used by today's most devious hackers

Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

7 sneak attacks used by today's most devious hackers

Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

11 signs your IT project is doomed

11 signs your IT project is doomed

No senior buy-in, minimum spec targets, a 'nothing can go wrong' mentality -- here's how to sense demise before your IT project meets its ignominious end.

True tales of (mostly) white-hat hacking

Stings, penetration pwns, spy games -- it's all in a day's work along the thin gray line of IT security

Load More