Is Your Company’s Data Being Sold on the Dark Web

Is Your Company’s Data Being Sold on the Dark Web?

Learn how Comodo can help you for free if any of your information is already for sale on the Dark Web. As companies scramble to find the best ways to protect themselves from ransomware and other types of malware and…

Containment technology

How to Reduce Complexity and User Friction by Improving Your Endpoint Security Posture

Live Webinar: Tuesday, May 23, 2017, 10 a.m. Pacific Information security professionals continue to struggle with endpoint security “expense-in-depth” while cyber threats and vulnerabilities persist. Why is this is happening now and how can complexity and user friction be reduced…

Alan turning

Endpoint Security Glossary

Here’s an A to Z glossary of terms related to Endpoint Protection- A Advanced Persistent Threat (APT) – An unauthorized person gaining access to a network, staying there undetected for a long period of time, intending to steal data than…

new version of comodo dome

Comodo Dome Shield: New Release Helps Managed Service Providers (MSPs) Grow Their Businesses and Drive Profit

Comodo has just released a new version of Comodo Dome Shield that significantly raises the bar for Managed Service Providers (MSPs). You can read the press release summarizing the improvements here. The bottom line summary: MSPs can now manage multiple…

COMODO INSPIRATION

COMODO ENGINEER – HONOR RECIPIENT AND INSPIRATION

Comodo’s own Egemen Tas was named as one of the “40 under 40 most influential Turkish-Americans.” Read more about it on our blog. It’s quite an honor to be recognized for excellence in your field, but perhaps even more so…

symantec Certificates

Google Chrome: “Intent to Deprecate and Remove: Trust in existing Symantec-issued Certificates”

As you might have seen from recent news headlines, Google Chrome has announced a proposal to deprecate certain Symantec certificates. This proposed update may potentially affect certificates issued by Symantec, Thawte, and Geotrust and would have a considerable impact on…

Mod Security

Learn how Comodo mod_security rules will protect your web servers against attack. Free!

Contents: 1. Introduction 2. Preparing the environment 3. Attack analysis and prevention 4. Conclusion 1) Introduction Web applications are arguably the most important element of today’s online infrastructure. They are used to power many features which are critical to online…

Wannacry ransomware

Comodo One. Viewing Security Systems on ITSM

Comodo One. Viewing Security Systems on ITSM How to view all threats identified on Android, Windows and Mac OS X devices over time on ITSM How to view a list of all programs that have been executed inside containment on…

Comodo Dome Shield

Comodo Dome Shield: Gateway Protection against Web-Borne Threats Now Available at No Charge

The web is the #1 vector for a wide variety of threats—from garden variety malware, to phishing attacks, ransomware, and beyond. Your users may receive an email that appears to be from a company that they actually do business with,…

Containment technology

Latest Wikileaks Document Dump: Comodo is a Pain for Hackers

The latest news regarding Wikileaks documents from the CIA has caused quite an industry stir, and also caught Comodo’s attention since we were mentioned in a couple of documents (and Stephen Colbert mentioned Comodo). Gaining notoriety with U.S. Intelligence Community…

Page 2 of 5912345...102030...Last »