Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
The White House has had several breaches of its physical security recently that have caused embarrassment and concern for the Secret Service. It now appears there needs to be concern for the White House’s cyber security defenses against cyber attack.
Yesterday, the White House revealed that an unclassified portion of its local network for the Office of the President had been breached by hackers. The network is used by the President’s senior staff, and the the FBI, Secret Service, and National Security Agency are all investigating.
It is believed that this was a probe that did not intend to cause to harm or damage systems and was simply cyber espionage. Unclassified documents can be very useful for attackers, especially for obtaining details to make phishing attacks that use deceptive emails more believable to the targets.
According to the Washington Post, the US did not discover the breach itself but was alerted by an Ally. The Post reports that Russia is believed to behind the attached. The security firm FireEye recently issued a report detailing a wide spread campaign by Russia to disrupt the infrastructure and security apparatus of the US and its NATO allies. The campaign took advantage of fault in the Windows operating system.
On Monday, the Wall Street Journal reported that malicious code had been discovered on a classified US military network. Although it could not be tied directly to the Russian government, the code had been written on Russian language machines and compiled during working hours in Moscow.
This is not the first time the White House network security has been breached. In 2012 the White House Office of Military Affair’s email system was compromised. The office is responsible for the Presiden’t travel schedule and the so called “nuclear football” which contains the codes for the President to launch a nuclear attack. That breach was traced back to Chinese hackers.
IT Service Management Tools
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats