Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
“I’m from the government and I’m here to help”.
You may know that this statement is often listed among “The World’s Greatest Lies”, along with “The check is in the mail”. Well, there are times when the government is really here to help.
While Americans vigorously debate and disagree about the role and scope of government, few would disagree that government needs to take the lead role in law enforcement, public safety and national security issues. It is a sign of the times that a relatively new government agency created to deal with cyber-attacks is turning up more and more in the news.
The United States Computer Emergency Response Team (US-CERT) is part of the National Cyber Security Division at DHS. It is the operations unit of the Cyber Security Division, responsible for analyzing and mitigating threats to federal networks and for coordinating information sharing with the private sector.
US-CERT and the Cyber Security Division were created as part of the government reorganization that occurred after the attacks of 9/11 in 2001. The early history of the division was rocky, with frequent management changes and charges that the group was disorganized and mismanaged.
Those of us that are skeptical of government based solutions are not surprised. Even agencies with good intentions tend to have mixed track records. Those of us living through the aftermath of hurricane Sandy can testify that FEMA’s performance has been erratic at best, good press notwithstanding.
However, if there was ever a need for a government response to a problem this is it. Threats to computer systems and networks have been increasing both in volume and seriousness in recent years. These threats are for both criminal and political purposes and originate both inside the US and from around the globe. State and local law enforcement can play a role, but they desperately need the kind of support that only a national response can provide.
The US banking system is an area of particular concern. Criminals use computer technology to commit bank fraud, steak and launder money. We know these crimes are on the rise, but the magnitude of the problem may be greater than people realize because they often go unreported or unpublicized. Corporate victims of cyber crimes often prefer to hide the crime than let the world know they were had.
Just as important as crime are threats for political reasons. The major banks have been targeted by foreign governments and political activists, so called hactivists. In September it was reported that some of the largest US banks had undergone Denial of Service (DOS) attacks that originated in Iran. Such attacks attempt to bring down networks and web sites by flooding them with messages to tie up their routers. Homeland Security and US-CERT have been very involved in the response to these threats.
Up to now, however, the most significant role of US-CERT has simply been providing information. For example, they publish a weekly bulletin of new software vulnerabilities and the patches available. As the threats grow, and you can bet they will, we will need a more proactive approach from the government.
Personally, this is one of the few examples where I support the government spending more money and expanding its role.
As an individual, there is only so much I can do to protect my computer from attacks. Of course, I have the best free antivirus system and best firewall available and keep up with the news of the latest threats. There is so much going on that it is impossible to protect yourself from every threat. We need all the help we can get. Hopefully US-CERT and Homeland Security will be there for us!
Tags: Cyber Security
Reading Time: 3 minutes [Pull quote: In my experience, our customers really appreciate our team’s attention to detail and ability to listen. Here at Comodo, we value professionalism–but we’re also available and friendly.– Stephen Corsale, SVP of Customer Success and Professional Services at Comodo] One thing that’s unique about the cybersecurity industry is that a vendor is successful when…
Reading Time: 3 minutes With cybersecurity playing such an essential role in modern-day business culture, many companies are sourcing highly specialized personnel to help keep their organizations secure. While departmental structures vary from company to company, many would agree a dedicated Chief Information Security Officer (CISO) provides the best bang for buck when establishing sustainable security practices now and…
Reading Time: 3 minutes It can be hard to imagine a world in which an attempted hack attack occurs roughly every 39 seconds. But research shows that’s the world we live in. Some organizations stay in a permanent defensive crouch, running scans and madly installing security patches as needed. While those are good ways to prevent a cyber attack,…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats