The 10 Windows group policy settings you need to get right
Configure these 10 group policy settings carefully, and enjoy better Windows security across the office
Roger A. Grimes | 04 Aug | Read more
Configure these 10 group policy settings carefully, and enjoy better Windows security across the office
Roger A. Grimes | 04 Aug | Read more
Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned.
Roger A. Grimes | 02 Aug | Read more
The PKI industry recommends that every SHA-1 enabled PKI move to the vastly more secure SHA-2. Here's why and how.
Roger A. Grimes | 06 Jul | Read more
Developer workstations are high-value targets for hackers and often vulnerable. Now you can protect them using concepts borrowed from securing system admin workstations.
Roger A. Grimes | 20 Jun | Read more
We've never been closer to getting pervasive, global identities. And with 2FA/MFA, you get all of the benefit with less of the risk.
Roger A. Grimes | 12 Jun | Read more
If you want to meet a really smart hacker, talk to a cybersecurity defender. These talented professionals are working every day to make cybercrime harder and less lucrative.
Roger A. Grimes | 06 Jun | Read more
Code embedded in hardware has vulnerabilities and it's harder to patch. That will make it a target for hackers.
Roger A. Grimes | 29 May | Read more
To root out persistent hackers, sometimes you have to get a little creative
Roger A. Grimes | 27 Apr | Read more
The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm
Roger A. Grimes | 20 Feb | Read more
Like it or not, your PC is susceptible to malware. These videos will teach you how to locate the bad stuff, then remove it from your system
Roger A. Grimes | 01 Feb | Read more
From secure chips to anonymity services, here’s how to stay safe and private on the web
Roger A. Grimes | 31 Oct | Read more
Here’s how to find out if your child is involved in malicious online activity -- before the authorities do
Roger A. Grimes | 05 Jul | Read more
You're far more vulnerable to hackers than you think. Here are the secrets to staying secure
Roger A. Grimes | 31 May | Read more
How to scan every running process on your system for malware in seconds, without installing antimalware software
Roger A. Grimes | 11 Dec | Read more
Forget Nigerian princes -- today’s spearphishing is sophisticated business, fooling even the most seasoned security pros
Roger A. Grimes | 09 Nov | Read more