Alan turning

Endpoint Security Glossary

Here’s an A to Z glossary of terms related to Endpoint Protection- A Advanced Persistent Threat (APT) – An unauthorized person gaining access to a network, staying there undetected for a long period of time, intending to steal data than…

new version of comodo dome

Comodo Dome Shield: New Release Helps Managed Service Providers (MSPs) Grow Their Businesses and Drive Profit

Comodo has just released a new version of Comodo Dome Shield that significantly raises the bar for Managed Service Providers (MSPs). You can read the press release summarizing the improvements here. The bottom line summary: MSPs can now manage multiple…

COMODO INSPIRATION

COMODO ENGINEER – HONOR RECIPIENT AND INSPIRATION

Comodo’s own Egemen Tas was named as one of the “40 under 40 most influential Turkish-Americans.” Read more about it on our blog. It’s quite an honor to be recognized for excellence in your field, but perhaps even more so…

symantec Certificates

Google Chrome: “Intent to Deprecate and Remove: Trust in existing Symantec-issued Certificates”

As you might have seen from recent news headlines, Google Chrome has announced a proposal to deprecate certain Symantec certificates. This proposed update may potentially affect certificates issued by Symantec, Thawte, and Geotrust and would have a considerable impact on…

Mod Security

Learn how Comodo mod_security rules will protect your web servers against attack. Free!

Contents: 1. Introduction 2. Preparing the environment 3. Attack analysis and prevention 4. Conclusion 1) Introduction Web applications are arguably the most important element of today’s online infrastructure. They are used to power many features which are critical to online…

ITSM

Comodo One. Viewing Security Systems on ITSM

Comodo One. Viewing Security Systems on ITSM How to view all threats identified on Android, Windows and Mac OS X devices over time on ITSM How to view a list of all programs that have been executed inside containment on…

Comodo Dome Shield

Comodo Dome Shield: Gateway Protection against Web-Borne Threats Now Available at No Charge

The web is the #1 vector for a wide variety of threats—from garden variety malware, to phishing attacks, ransomware, and beyond. Your users may receive an email that appears to be from a company that they actually do business with,…

Internet security

Latest Wikileaks Document Dump: Comodo is a Pain for Hackers

The latest news regarding Wikileaks documents from the CIA has caused quite an industry stir, and also caught Comodo’s attention since we were mentioned in a couple of documents (and Stephen Colbert mentioned Comodo). Gaining notoriety with U.S. Intelligence Community…

RSA

Thoughts on RSA 2017

Read the blog article to find out what were the hot topics discussed during RSA Conference 2017.  Information technology and cybersecurity are constantly evolving, and security conferences struggle to keep up. RSA is no exception. This year’s massive conference in…

Internet security

Professor Evans & his Essay On the Impossibility of Virus Detection

Why Is Computer Security So Hard? On the Impossibility of Virus Detection Professor Dave Evans teaches Computer Science at the University of Virginia. His current research seeks to enable the cost-effective production of complex computer systems that can be trusted…

Page 1 of 5812345...102030...Last »