Roger A. Grimes, KnowBe4’s data-driven defense evangelist

Share:

Listens: 0

No Password Required

Technology


Can a piece of dust on your touchscreen compromise your data? The answer is yes. We learn how from No Password Required Podcast guest Roger A. Grimes, KnowBe4’s data-driven defense evangelist, whose mission is to educate others about cybersecurity issues that can compromise computers. He shares two of the largest threats of cyberattacks impacting companies: social engineering and unpatched software. His simple advice for avoiding 99% of cyber risks: “Patch your stuff and don’t get tricked into doing something you shouldn’t; you do those two things and you will not get hacked.”Roger is a prolific author, blogger and speaker. He shares his 30+ years of penetration testing/ethical hacking expertise with companies and tech professionals to improve their security and defend their network. In this interview, he talks about man-in-the-middle attacks and other social engineering scams that open doors for data breaches. He examines the lack of improvement in technical controls and the proliferation of adversaries and continuous daily malware attempts. Roger also discusses the future of computing with quantum supremacy on the horizon and the threat it poses to public key cryptography. Topics in Order:Who is Roger A. Grimes?Hacking Isn’t That Hard Is Misinformation Part of the Cybersecurity ProblemAnti-Virus and Firewalls Don’t Work - Close Your Computer Exploits by Patching Software 10 Ways I Can Hack YouRecognizing Red Flags of Social EngineeringWhy is Hacking Still Such a ProblemHow to Hack Passwords & Multi-factor AuthenticationThe Truth Behind Password Lengths and Password PoliciesHow to Never Be HackedIs that Dust or Hair on Your Touchscreen? Nope, it’s an Embedded ScamWhat are the Two Biggest Cybersecurity Risks?Have You Heard of this Scam? Security Awareness Training and Social EngineeringCreating a Cyber Culture for Your Employees through Security Awareness TrainingThe End of Classic ComputingWill Quantum Computers Launch in 2019?  The Sprint for Quantum SupremacyA Better Future with Quantum ModelsThe Downside of Quantum Computers: Breaking the Public Key CryptographyThe Coming Quantum BreakPost-Quantum Encryption and Susceptibility Has the Quantum Crypto Break Already Happened? Is Quantum Supremacy a Big Deal or the Next Y2K?What is Crypto-Agility and Will it Matter with Quantum Computing?Is Society Becoming Tolerant of Hacking and Cybercrime? Why and What Do We Do About It?