Generative Data Intelligence

Tag: usability

Round Up The Usual Suspects | Comodo

Reading Time: 2 minutesOne of the most iconic films has to be Casablanca, the Humphrey Bogart and Ingrid Bergman classic about a...

Round Up The Usual Suspects

Reading Time: 2 minutes One of the most iconic films has to be Casablanca, the Humphrey Bogart and Ingrid Bergman classic about a nightclub...

Is Your Endpoint Security Upgrade Not a ’10?’ Here’s 5 Tips

Reading Time: 1 minuteUpgrade issues and a checkered history of customer infections are good reasons to reevaluate your options for endpoint protection. Even...

Comodo | Making Sense of Endpoint Malware Protection Technology

Reading Time: 2 minutesDownload the latest newsletter from Comodo featuring Gartner research to learn how to make sense of endpoint malware protection...

Comodo Newsletter – Making Sense of Endpoint Malware Protection Technology

Reading Time: 2 minutes Download the latest newsletter from Comodo featuring Gartner research to learn how to make sense of endpoint malware protection technology...

How Artificial Intelligence is changing the travel industry

From spotting patterns in booking behaviors to highlighting the decision-making process for specific demographics to keeping track of luggage (and doubling as an...

There is no such thing as good malware

Reading Time: 4 minutesThere used to be a meme going around that stated “there are two types of companies in the world, those...

How to Reduce Complexity and User Friction by Improving Your Endpoint Security Posture

Reading Time: 2 minutesLive Webinar: Tuesday, May 23, 2017, 10 a.m. Pacific Information security professionals continue to struggle with endpoint security “expense-in-depth” while cyber...

Professor Evans & his Essay On the Impossibility of Virus Detection

Reading Time: 3 minutesWhy Is Computer Security So Hard? On the Impossibility of Virus Detection Professor Dave Evans teaches Computer Science at the University of...

Comodo One. Understanding Windows Profiles in ITSM

Reading Time: 36 minutesComodo One. Understanding Windows Profiles in ITSM How to hide/show security client and communication client tray icons in devices? Step 1: Go...

Alan Turing, undecidable problems, and malware

Reading Time: 3 minutesIn 2003, Oxford University Philosophy Professor Nick Bostrom posed the following question: what if an artificial intelligence (AI)...

Free Amazon Gift Card? Just Say No!

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Android users throughout North American are being text message...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?