Information Security & Risk Management Summit 2018

What We Learned at Gartner Information Security & Risk Management Summit 2018 in Maryland

The Gartner Information Security & Risk Management Summit at National Harbor, Maryland ran from June 3rd to 7th. Gartner’s event is a great opportunity for…

Cyber Security

Here’s What I Learned at RSAC 2018

The RSA Conference is one of the biggest events in the world of cybersecurity. I wasn’t there this year, but most of my colleagues were.…

cryptojacking

Are You One of the Millions Secretly Victimized by Cryptojacking?

Bitcoin… Blockchain… Cryptocurrency… and Now Cryptojacking! I know what you’re thinking… I have nothing to do with these technologies, why should I care? As of…

Comodo Cybersecurity

Day 2: RSA Conference

Without human intervention, a stone is just a stone. But when it is lifted and placed within a broader structure, like a winding country wall,…

Cyber Security

Day 1: RSA Conference 2018

There’s no better time than the present, or so they say. And when it comes to protecting sensitive data and finding increased guardianship in the…

Printer and scanner malware

How to Protect Yourself from Printer/Scanner Malware

In a rather new trend, cybercriminals have begun to spread malware by spoofing printers and scanners. These types of attacks started making headlines in late…

Online Security

Comodo’s 2018 Cybersecurity Predictions: Smart Infrastructure Security, SSL Everywhere, The Rise of AI and More

Cybersecurity in 2017 was a long, winding road with many surprising obstacles. Every other week, there seemed to be a new widespread cyberthreat wreaking havoc,…

ransomware

Cyberstrategy for 2018: Time to Prepare for the Worst?

Are you ready for 2018?  If you were not a headline in the 2017 blizzard of cyber breaches, then you’re better off than your peers…

Security

How to increase your cyber security by asking three easy questions

Every cybersecurity responsible person knows the power of paranoia. Assume nothing, test everything, and then do it again.   Here are three basic questions to…

ransomware

Security has to start and end with trust.

When you use a company’s security solution, you are placing your reputation in their hands, and you must trust their ability to think through how…

Page 1 of 3123