Endpoint Security

How to Stay Protected from WannaCry Ransomware

What is WannaCry 2.0 Ransomware? WannaCry malware also referred to as WannaCrypt, WanaCrypt0r 2.0 or Wanna Decryptor, is a virus that combines a ransomware and…

Wannacry

The WannaCry Ransomware Attack: Combating Ransomware is Possible

WannaCry, the ransomware that attacked networks in many leading healthcare organizations and other organizations across the globe on Friday, is hot news. WannaCry, which hit…

Is Your Company’s Data Being Sold on the Dark Web

Is Your Company’s Data Being Sold on the Dark Web?

Learn how Comodo can help you for free if any of your information is already for sale on the Dark Web. As companies scramble to…

Online Security

How to Reduce Complexity and User Friction by Improving Your Endpoint Security Posture

Live Webinar: Tuesday, May 23, 2017, 10 a.m. Pacific Information security professionals continue to struggle with endpoint security “expense-in-depth” while cyber threats and vulnerabilities persist.…

malware incidents

Endpoint Security Glossary

Here’s an A to Z glossary of terms related to Endpoint Protection- A Advanced Persistent Threat (APT) – An unauthorized person gaining access to a…

Trojan

Comodo Dome Shield: New Release Helps Managed Service Providers (MSPs) Grow Their Businesses and Drive Profit

Comodo has just released a new version of Comodo Dome Shield that significantly raises the bar for Managed Service Providers (MSPs). You can read the…

COMODO INSPIRATION

COMODO ENGINEER – HONOR RECIPIENT AND INSPIRATION

Comodo’s own Egemen Tas was named as one of the “40 under 40 most influential Turkish-Americans.” Read more about it on our blog. It’s quite…

Intent to Deprecate and Remove

Google Chrome: “Intent to Deprecate and Remove: Trust in existing Symantec-issued Certificates”

As you might have seen from recent news headlines, Google Chrome has announced a proposal to deprecate certain Symantec certificates. This proposed update may potentially…

Learn how Comodo mod security rules will protect your web servers against attack

Learn how Comodo mod_security rules will protect your web servers against attack. Free!

Contents: 1. Introduction 2. Preparing the environment 3. Attack analysis and prevention 4. Conclusion 1) Introduction Web applications are arguably the most important element of…

Antivirus

Comodo One. Viewing Security Systems on ITSM

Comodo One. Viewing Security Systems on ITSM How to view all threats identified on Android, Windows and Mac OS X devices over time on ITSM…

X