Generative Data Intelligence

Tag: dealing

Reach #2: Silvia Oviedo Lopez, Pinterest’s Head of International Product & Operations

In Episode 2, Vasco talks with Silvia Oviedo Lopez, Pinterest’s Head of International Product & Operations.Localization is optional, but internationalization is not. The...

Comodo KoruMail: Comprehensive Solution to the Spam Onslaught

Reading Time: 3 minutesSpam email is to the Internet what pollution is to waterways and phishing email is the most toxic of digital...

Online Privacy and Security Concerns in an Age of Terror

Reading Time: 4 minutesOnce again, terror is in the news and dominates much of the national discussion. A major European city, the great...

Data Leaks? Plug Them with MyDLP

Reading Time: 2 minutesComodo has recently acquired MyDLP, a complete Data Loss Prevention (DLP) solution that provides Enterprise grade protection for organizations big...

POS Under Attack: The Why, How & What to Do

Reading Time: 4 minutesOver the past year, there have been an alarming number of high profile data breaches of customer cardholder and personal...

Homeland Security Warns Phishing Spreading Banking Malware

Reading Time: 2 minutesUS Homeland Security sent out an alert this week about an email phishing campaign that is distributing the “Drye” (or...

Comodo Adds New Chromium Secure to Your Choice of Secure Browsers

Reading Time: 1 minuteComodo has released a new Chromium browser that has all of the features of our popular Comodo Dragon browser, but...

How to Handle a Data Breach

Reading Time: 3 minutesThere is a right way and a wrong way for an organization to handle a data breach. Unfortunately, they are...

Dark Wallet, What’s all the Fuss About?

Reading Time: 5 minutesIn the last few weeks, I have read a fair amount of press coverage about a new Bitcoin wallet application...

Hackers Target Silverlight to Deliver Malware

Reading Time: 2 minutesThe case for a containment strategy to defend against malware grew even stronger this week with reports that hackers are...

Supreme Court: Is Seizing a Mobile Phone is Like Seizing a Computer?

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app If a person is arrested for a routine traffic violation...

Understanding Containment: Malware Defense for the Real World

Reading Time: 4 minutesIt is virtually impossible for the files of known viruses used by conventional scanners to be fully up to date....

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?