RG

Roger Grimes

Data-Driven Defense Evangelist at KnowBe4
On the record
Represented by:
Share profile 
Link:
Bio
Edit

Roger Grimes is a 30-year Computer Security Consultant, Instructor, holder of dozens of computer certifications and an award-winning Author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a Bachelor’s Degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.

Employment
Sign up to view all
  • KnowBe4
    Data-Driven Defense Evangelist
  • BYOD: A Failed Trend or a Hybrid Future?
    Roger says, "BYOD was a dominant IT strategy 15-20 years ago, but its cons outweighed the pros." He notes cost-savings myths, privacy issues, and security challenges. Today, workplaces adopt a hybrid model, using both personal and work devices. Roger concludes, "The BYOD experiment proved it didn't work; most employers now provide devices."
  • Beware: Credit Card Romance Scams Targeting the Lonely
    Roger warns, "The scammer tricks the victim into providing their credit card details." Paul adds, "Romance scammers target lonely people." Victims should report scams to their credit card company and seek counseling. Awareness is key: any online romance asking for money is a red flag. Protect yourself by recognizing these tactics and maintaining healthy skepticism in online relationships.
  • Small Security Teams: Navigating Post-Quantum Cybersecurity Challenges
    Dr. Marc advises using automated tools for cryptographic management and securing channels with quantum-ready protocols. Roger stresses starting a "post-quantum" project with management support, inventorying critical data, and preparing for a Y2K-like upgrade. Both emphasize the urgency of aligning with NIST standards to address quantum threats.
Recent Quotes
Sign up to view all
  • There does seem to be a successful pushback by law enforcement agencies in that we are seeing some signs of an activity and profit peak from types of cybercriminals, like ransomware.

Headshots