Most companies are not focused on the real security threats they face, leaving them ever more vulnerable. That can change if they trust their data rather than the hype.
Roger A. Grimes |
17 Jan |
Read more
Bay Dynamics takes a data-driven approach to helping companies identify and address the real security threats based on asset value.
Roger A. Grimes |
09 Jan |
Read more
A recent spate of successful attacks against our most popular and trusted cryptographic algorithms has me hoping that all companies understand the importance of crypto-agility.
Roger A. Grimes |
03 Jan |
Read more
Despite demonstrations to show it's possible, documented cases of RFID credit card fraud are unknown. And as security professionals know, there is a huge gulf between potential crime and actual crime.
Roger A. Grimes |
19 Dec |
Read more
RFID wallets, sleeves and clothing are security snake oil. You don't need RFID protection because there is no RFID crime.
Roger A. Grimes |
18 Dec |
Read more
Both bitcoin and blockchain are vulnerable to attack. Here's what you need to know to protect yourself and why blockchain is becoming a foundational technology.
Roger A. Grimes |
12 Dec |
Read more
As a 30-year road warrior, I’ve learned some security truths that seem wrong, but must be accepted if you really want to understand the threats you face.
Roger A. Grimes |
06 Dec |
Read more
Thinking of buying a consumer IP camera for use as a surveillance system in your business? Read this first.
Roger A. Grimes |
30 Nov |
Read more
Penetration testing, or ethical hacking, is an in-demand skill for evaluating an organization’s defenses. Here’s what it entails and tips for breaking into the role.
Roger A. Grimes |
22 Nov |
Read more
Auditing your registry can turn up telltale signs on malware infection. Here's how to monitor the registry keys that matter using Microsoft's Sysinternals Autoruns.
Roger A. Grimes |
10 Nov |
Read more
Hey Windows users: Here's how to get the incredible power of 67 antivirus engines with no performance impact on your computer
Roger A. Grimes |
26 Oct |
Read more
Do cloud-based mobile VPNs work for the enterprise? Many businesses are saying "yes," but you need to choose a moble VPN and how you use it carefully.
Roger A. Grimes |
18 Oct |
Read more
Becoming a certified ethical hacker, also called a penetration tester, is a popular goal among information security professionals. Here are your best options for reaching it.
Roger A. Grimes |
05 Oct |
Read more
The OAuth open authorization framework allows websites and services to share assets among users. It is widely accepted, but be aware of its vulnerabilities.
Roger A. Grimes |
16 Aug |
Read more
The EU's General Data Protection Regulation requires companies to protect the privacy of their EU customers. Here's what you need to know.
Roger A. Grimes |
14 Aug |
Read more