Generative Data Intelligence

Tag: security breaches

Frank Sanchez of Finxact

Today we are talking to Frank Sanchez of the cloud based SaaS banking software company Finxact. Here’s Frank with his answers to our...

Evaluation Criteria for Next-Gen Endpoint Protection

Reading Time: 3 minutesEndpoints are extremely vulnerable to security breaches. Hackers find endpoints to channel out infectious attacks through advanced persistent threats...

5 Points to Consider When Evaluating Next-Generation Endpoint Security Products

Reading Time: 3 minutesEndpoints are extremely vulnerable to security breaches. Hackers find endpoints to channel out infectious attacks through advanced persistent threats and...

Top 10 Effective Endpoint Security | Comodo Endpoint Protection

Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security...

Best 10 Features of an Effective Endpoint Security Strategy

Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security measures...

Top 10 Features of an Effective Endpoint Security Strategy 2020

Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security...

Educational Institutions Turn to Comodo for Security

Reading Time: 3 minutesComodo, as a matter of company policy, supports education in the United States and provides our security products at reduced...

Hacktivism a Growing Concern for IT

Reading Time: 3 minutesThe very existence of the United States as a nation can be traced back to a protest movement against taxes....

Cyber Crime and the Case for Auto Sandboxing

Reading Time: 2 minutesEvery computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits,...

February’s gone. But not forgotten.

Reading Time: 2 minutesIf you happen not to have been a frequent reader of the Blog contributions I’ve published within the Social Media...

VeriSign is 4th big name this year to admit isecurity breaches

Reading Time: 2 minutesFirst came Symantec and Norton (January 18th Blog). Next up was McAfee (January 20th Blog). Now it’s VeriSign’s turn. As hard as...

Comodo Partnership Secures US Colleges and Universities with SSL

Reading Time: 3 minutesIn just the first year of a unique partnership, InCommon (incommon.org) and Comodo (Comodo.com) have issued tens of thousands of...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?