Online Security

How to Check Your Website Security

These days, everyone is concerned about online security. Recent data breaches and ransomware attacks have demonstrated that hackers have the ability to cause immense damage…

Patch Management

3 Important Things Windows Patch Management Should Do.

IT professionals understand the necessity of patches, even if it’s not one of their favorite things to do. However, if someone told you that there…

Website Security

Family Business Web Filtering Solution- Comodo Dome

If you have kids, you know that the internet can be a dangerous place. But the internet can be equally, if not more dangerous to…

Antispam

Getting Started With Comodo IT and Security Manager (ITSM)

Comodo IT and Security Manager (ITSM), which is a part of Comodo One initiative and is available absolutely free, assists MSPs in managing their client…

Endpoint Security

Ovum Research: Protecting Endpoints with Containment, Cloud Now “On the Radar”

A new research note profiling the unique auto-containment + Cloud analysis approach to endpoint protection in Advanced Endpoint Protection was just released by London-based research…

ransomware

Cyberstrategy for 2018: Time to Prepare for the Worst?

Are you ready for 2018?  If you were not a headline in the 2017 blizzard of cyber breaches, then you’re better off than your peers…

Comodo Q3 2017 Threat Report: Comodo Detects Malware in Every Country on Earth

In Q3 2017, Comodo Threat Research Labs (CTRL) detected nearly 400 million malware incidents from around the world – and some within every nation-state on…

WordPress Roulette

WordPress Roulette

WordPress, the world’s most popular CMS, requires web admins to perform a massive amount of time and effort to maintain currency and to be secure…

pc security

What’s Next for Melih?

Melih took on the giants of the PKI certificate business and bested them, by creating the world’s leading certificate authority. Now that he has “sent…

PC Security

Marketing can be a very powerful influence on our ability to accept situations that are sub-optimal

Sometimes a marketing analogy misleads us about the complex idea it is trying to simplify. A great example of this is equating computer security to…

Page 1 of 6512345...102030...Last »