Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Roger Grimes

CISO Advisor

Roger A. Grimes, CISO Advisor for KnowBe4, Inc., is the author of 15 books and over 1500 articles, specializing in host security and preventing hacker and malware attacks. Roger is a frequent speaker at national computer security conferences and his presentations are fast-paced and filled with useful facts and recommendations.
Request This Speaker


Recent Posts

Introducing Our KnowBe4 AI Agents

Although artificial intelligence (AI) seems relatively new to a lot of people, it was first officially created in 1956 and has been a large, improving branch of computer science ever ...

Great Patching Lessons To Learn From The Zero Day Clock

I just came across the Zero Day Clock, and I love it. Everyone should go there, see the stats, see the trends, and figure out what that means for your ongoing and future patch management ...

100,000+ New Vulnerabilities This Year and Most Will Be Zero-Days Exploited Faster

The number of publicly reported unique vulnerabilities has risen year after year. There was a brief decrease and stabilization in 2015 - 2016, but those are the only years in the over two ...

Our KnowBe4 Community Is One of Our Greatest Strengths

I am very proud of our customer community here at KnowBe4. It is a place where customers can discuss our products amongst each other and interface with KnowBe4’s developers and product ...

So Many AI Attacks, It Made Quantum Seem Easy

As I was writing my latest book, How AI and Quantum Impact Cyber Threats and Defenses, I was hit by how many theoretical and real attacks there are involving AI. There are attacks ...

Exposing the Kroll Crypto Wallet Scam

I’ve been contacted by the real Kroll (www.kroll.com) a few times over the last few years regarding various real class action lawsuits they are involved in, including as recently as a few ...

[Arms Race] Hackers Use AI. Here’s Why Defenders Must Too

Yes, you need AI to defeat AI. Long-time followers of mine know that I am not an AI hype person. Some people might even call me an AI critic. I prefer to call myself an AI realist. I do ...

AI-to-AI Communication and Secret AI Code Must Be Stopped At All Costs

As I wrote in my recent book, How AI and Quantum Impacts Cyber Threats and Defenses, as we humans use AI more and more, AI will begin to communicate with itself using new AI-only ...

Fake Calendar Invitations Move to Microsoft Outlook

Fake calendar invites have been a problem on Gmail for years. Even though they could appear on other calendar services, I hadn’t seen or read about a lot of it. Gmail had been taking the ...

TurboTax SMS Scam

It is tax season in the United States and that means plenty of tax scams. I recently received these SMS messages.

Common Facebook Scam Method

A friend posted this on Facebook and it came up on my feed.

Google Reports On Adversarial Use of AI in Late 2025

Google Threat Intelligence Group recently released its latest report, “GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Us,” on how ...

Your Password Needs To Be 25 Characters or Longer Due to AI and Quantum Attacks

Prior to my further research into AI and quantum for my latest book, How AI and Quantum Impact Cyber Threats and Defenses, I had pretty solid password policy recommendations:

New Book! How AI and Quantum Impact Cyber Threats and Defenses

I am excited to announce my latest book, How AI and Quantum Impact Cyber Threats and Defenses: Shaping Your Cyber Defense Strategies.

Love in the Age of AI - Why 2026 Romance Scams are Almost Impossible to Spot

Valentine’s Day is usually a time for flowers and candlelight, but in recent years the digital dating landscape has shifted from a place of hope to a high-tech minefield. While ...

ConsentFix Attacks Fake Cloudflare Prompts

ClickFix attacks have been around for decades; only the name is new. ClickFix attacks use social engineering to trick users into clicking on buttons and links that the user is told are ...

Be Careful of That Warrant for Your Arrest

A popular phone call/voicemail scam (i.e., vishing) involves someone calling you, claiming to be law enforcement with a warrant for your arrest, and then offers you an opportunity to ...

Unmasking the Deepfake Threat: A Game-Changer for Reducing Human Risk

Today, anyone can find a picture of absolutely anybody and it is also not difficult to find a sample of their voice. By combining these it is shockingly easy to create a realistic AI ...

North Korean Job Invitation

A friend of mine, John D., received this outreach on Threads (see below). At first, he thought it was the standard fake employer scam, but it is more than that. It is very likely part of ...

How KnowBe4 Uses AI Efficiently to Get the Best Results

Using the right tool for the job is always better. Anyone who does DIY projects around the home knows how using the right tool can dramatically make the job you are doing far easier. Use ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.