COMODO INSPIRATION

COMODO ENGINEER – HONOR RECIPIENT AND INSPIRATION

Comodo’s own Egemen Tas was named as one of the “40 under 40 most influential Turkish-Americans.” Read more about it on our blog. It’s quite an honor to be recognized for excellence in your field, but perhaps even more so…

symantec Certificates

Google Chrome: “Intent to Deprecate and Remove: Trust in existing Symantec-issued Certificates”

As you might have seen from recent news headlines, Google Chrome has announced a proposal to deprecate certain Symantec certificates. This proposed update may potentially affect certificates issued by Symantec, Thawte, and Geotrust and would have a considerable impact on…

Mod Security

Learn how Comodo mod_security rules will protect your web servers against attack. Free!

Contents: 1. Introduction 2. Preparing the environment 3. Attack analysis and prevention 4. Conclusion 1) Introduction Web applications are arguably the most important element of today’s online infrastructure. They are used to power many features which are critical to online…

ITSM

Comodo One. Viewing Security Systems on ITSM

Comodo One. Viewing Security Systems on ITSM How to view all threats identified on Android, Windows and Mac OS X devices over time on ITSM How to view a list of all programs that have been executed inside containment on…

Comodo Dome Shield

Comodo Dome Shield: Gateway Protection against Web-Borne Threats Now Available at No Charge

The web is the #1 vector for a wide variety of threats—from garden variety malware, to phishing attacks, ransomware, and beyond. Your users may receive an email that appears to be from a company that they actually do business with,…

Internet security

Latest Wikileaks Document Dump: Comodo is a Pain for Hackers

The latest news regarding Wikileaks documents from the CIA has caused quite an industry stir, and also caught Comodo’s attention since we were mentioned in a couple of documents (and Stephen Colbert mentioned Comodo). Gaining notoriety with U.S. Intelligence Community…

RSA

Thoughts on RSA 2017

Read the blog article to find out what were the hot topics discussed during RSA Conference 2017.  Information technology and cybersecurity are constantly evolving, and security conferences struggle to keep up. RSA is no exception. This year’s massive conference in…

Internet security

Professor Evans & his Essay On the Impossibility of Virus Detection

Why Is Computer Security So Hard? On the Impossibility of Virus Detection Professor Dave Evans teaches Computer Science at the University of Virginia. His current research seeks to enable the cost-effective production of complex computer systems that can be trusted…

Comodo One

Comodo Gains More than Half of SSL Market Share for First Time Ever

Read the infographic to find out why Comodo gained more than half of the SSL market in the history of the Netcraft Secure Server Survey.

RSA

Comodo One. Configuring roles in ITSM

Comodo One. Configuring roles in ITSM How to assign/re-assign a role to the specific user How to create a new role with custom permissions How to create a new staff and change role How to customize permissions for a role…

Page 1 of 5812345...102030...Last »