HOW TO RECOGNIZE THE RIGHT SSL CERTIFICATE FOR YOUR BUSINESS
Read ValueWalk’s article to learn more about SSL certificates and the factors that will help you choose the right certificate for your business.
Comodo: Cloud Native Cyber Security Platform
Read ValueWalk’s article to learn more about SSL certificates and the factors that will help you choose the right certificate for your business.
Todd Thiemann, vice president of product marketing at Comodo, shares three suggestions he’d apply if he were launching an MSP from scratch today.
Read Phillip Hallam-Baker byline article about Transport Layer Security (TLS).
Read Phillip Hallam-Baker response to about the Twitter bot crisis.
Read the article to learn more about how you can make your certificates more secured with Comodo.
Read Phillip Hallam-Baker explanation about the changes that might affect laptop security due to the shift of US Border Policy.
Read Comodo Vice President and Cyber Security Expert Phillip Hallam-Baker explanation on what are the possibilities when U.S. interfered with North Korean missile test.
Read Comodo’s Kenneth Geers commentary about the CIA’s leak.
Cloud-based security service that blocks malicious websites, allows web domain filtering is now available at no charge CLIFTON, N.J.– March 28, 2017 – Comodo, a global innovator and developer of cybersecurity solutions (Virus removal software, POS security program, endpoint security software etc) and the worldwide leader in digital certificates, today announced that it is making Comodo Dome Shield, its …
Comodo has submitted two new Certificate Transparency logs for approval by Google, which aim to accept any publicly trusted certificates from any CA.
Read Kenneth Geers, a Senior Research Scientist at Comodo, commentary on the article about Russian cyber operations
Read Kenneth Geers, a Senior Research Scientist at Comodo, article on the next moves in the cybersecurity industry.
Advanced Endpoint Protection also named a finalist in Endpoint Security, Anti Malware and APT Security categories CLIFTON, N.J., Feb. 22, 2017 – Comodo Security Solutions Inc., a global innovator and developer of cybersecurity products, today announced that Comodo Advanced Endpoint Protection (AEP) has placed Gold in the Ransomware Protection category of the 2018 Cybersecurity Excellence Awards. Comodo AEP was …
Comodo AEP Named Best in Ransomware Protection in 2018 Cybersecurity Excellence Awards Read More »
Read Comodo’s Kenneth Geers commentary onWhite House site security error
Comodo’s endpoint solution is relatively new to the market, but has posted strong adoption rates and has just been added to Gartner’s Magic Quadrant.
Comodo’s endpoint solution is relatively new to the market, but has posted strong adoption rates and has just been added to Gartner’s Magic Quadrant.
Comodo is recognized for its completeness of vision and ability to execute CLIFTON, N.J.—Feb. 1, 2017 – Gartner Inc. has added Comodo’s Advanced Endpoint Protection (AEP) solution to its Endpoint Protection Platform (EPP) Magic Quadrant in recognition of the company’s completeness of vision and ability to execute1. Comodo is a global innovator and developer of cybersecurity solutions (Virus removal software, …
COMODO NAMED TO GARTNER ENDPOINT PROTECTION PLATFORM (EPP) MAGIC QUADRANT Read More »
Comodo announced an updated Comodo Advanced Endpoint Protection (AEP) product that extends availability of its superior default-deny endpoint security to Mac OS X and Linux platforms
New product adds enhanced auto-containment and protection against fileless malware to default-deny platform CLIFTON, N.J.– Feb. 2, 2017 – Comodo, a global innovator and developer of cybersecurity solutions (Virus removal software, POS security program, endpoint security software etc) and the worldwide leader in digital certificates, today announced an updated Comodo Advanced Endpoint Protection (AEP) product that extends availability …
COMODO ADVANCED ENDPOINT PROTECTION FOR MAC OSX AND LINUX SYSTEMS Read More »
Network World’s article includes Comodo in the endpoint security spotlight
Comodo announced an updated Comodo Advanced Endpoint Protection (AEP) product that extends availability of its superior default-deny endpoint security to Mac OS X and Linux platforms
Read Comodo’s Kenneth Geers commentary on “Little green bytes”
RSA Conference 2017—SAN FRANCISCO– Jan. 24, 2017 – Comodo, a global innovator and developer of cybersecurity solutions, has announced that Senior Research Scientist Kenneth Geers will be a prominent speaker at RSA Conference 2017, presenting on topics ranging from geopolitics in the digital age and cyber war to global malware trends, during three sessions in San …
Read Comodo’s Vice President Sales North America, George Muldoon, talks about a year after the release of Comodo 360.
Read what Comodo’s Kenneth Geers commentary on phishing scam
CLIFTON, N.J.– Jan. 18, 2017 — Distinguished leader in digital certificates Neal Creighton has joined Comodo, a global innovator and developer of cybersecurity solutions (Virus removal software, POS security program, endpoint security software etc) and the worldwide leader in digital certificates, the company announced today. He will serve as a key advisor, providing insight into the …
Free, user-friendly product offers customizable feature set for browsers and any ‘regular’ application to fit a range of cybersecurity needs CLIFTON, N.J.– Jan. 17, 2017 — Comodo, a global innovator and developer of cybersecurity solutions and the worldwide leader in digital certificates, has released its latest free protection option, Comodo Internet Security (CIS) 10, upgraded to …
COMODO RELEASES INTERNET SECURITY 10 WITH POWERFUL ANTI-MALWARE SHIELD Read More »
Read Comodo’s Kenneth Geers article on what Yahoo could have done to prevent the breach.
Comodo included in the endpoint security trends to look out for this 2017.
Read the tips on how to fight ransomware that will help you save huge amount of money
Read the new and improved features of Comodo Internet Security 1
Read why Comodo’s Michael Fowler said that SSL encryption of websites will increase exponentially
Comodo released a new version of Internet Security. Read the article to find out the new and improved features.
End users can look for applications using EV Code Signing Certificates from Comodo in order to feel safe and trust the application
New certificate type prevents malware authors from hiding behind a wall of certificate anonymity CLIFTON, N.J.– Dec. 22, 2016 — Comodo, a global innovator and developer of cybersecurity solutions and the worldwide leader in digital certificates, today announced that EV Code Signing certificates will be made available in January 2017. By introducing EV Code Signing certificates …
World’s Largest CA Comodo Announces EV Code Signing Certificate Availability Read More »
In addition to the huge threat banking Trojans already pose to financial firms, cybercriminals are now attaching file-encrypting ransomware programs to create a new level of danger for mobile users.
Read why Comodo was included in PC Mag’s review on best security suites of 2017.
Read the whitepaper about how players in the cybersecurity industry claiming they’ve come up with the elusive magic bullet to stop malware and breaches but clearly, it isn’t effective.
This paper is the direct result of a simple question that a customer asked us recently: “What if a malicious file were to escape Comodo’s containment technology, wouldn’t it be ‘game over’?”
Read Comodo’s research and analysis on another mobile banking trojan called Tordow 2.0 that has the ability to encrypt files
According to Softpedia, the new Tordow, spotted by Comodo in Russia, has the potential to become a worldwide threat. Read the article to find out why.
Comodo Threat Research Labs have identified a new malware Tordow v2.0 which is the first mobile banking Trojan created specifically for Android devices affecting users in Russia.
Read Comodo’s commentary on an updated variant of the Tordow Android malware featuring additional data collection capabilities and ransomware-like behavior.
Achievement pivots on AutoSSL, now 100 percent available to cPanel’s 72 million active domains CLIFTON, N.J. and HOUSTON—Dec. 8, 2016 — Today, 90 percent of all websites do not have SSL encryption, putting their customers’ sensitive information at risk. To remedy this widespread vulnerability, cPanel, Inc., the web hosting platform leader with 72 million active domains, has introduced AutoSSL …
Achievement pivots on AutoSSL, now 100 percent available to cPanel’s 72 million active domains CLIFTON, N.J. and HOUSTON—Dec. 8, 2016 — Today, 90 percent of all websites do not have SSL encryption, putting their customers’ sensitive information at risk. To remedy this widespread vulnerability, cPanel, Inc., the web hosting platform leader with 72 million active domains, has introduced AutoSSL …
Track to explore ever-increasing threats to national and cybersecurity and how to combat them BERLIN, Germany – Nov. 21, 2016 — The ever-increasing threats to national and cybersecurity and insights on how to combat them will be addressed in an upcoming track at “The Digital Society Conference 2016: Defending Democracy – Increasing Innovation,” hosted by the …
Comodo Certificate Manager automatically discovers all internal and external SSL/TLS certificates in the enterprise and organizes them into one central inventory to simplify SSL/PKI tracking and management CLIFTON, New Jersey — Nov. 15, 2016 — Comodo, a global innovator and developer of cybersecurity solutions ( Virus Removal software, Endpoint Security software, RMM tool etc) and the worldwide leader in …
COMODO LAUNCHES NEW FULL LIFECYCLE DIGITAL CERTIFICATE MANAGEMENT PLATFORM Read More »
RSA Conference 2016 Abu Dhabi—ABU DHABI, United Arab Emirates – Nov. 11, 2016 — Comodo, a global innovator and developer of cybersecurity solutions, today announced that Senior Research Scientist Kenneth Geers will present on the growing and evolving threat of ransomware in the Middle East at RSA Conference 2016 Abu Dhabi, Nov. 15-16. For the uninitiated, ransomware is …
Lectures to explore how terrorists utilize the digital world to further their malicious missions and how to defend against them ANKARA, Turkey—Nov. 7, 2016 — The challenges created by terrorists and their manipulation of the digital world to further their malicious missions will be addressed in an upcoming lecture, “Terrorist Use of Cyberspace,” hosted by the …
Lecture to explore the challenges of cyber warfare, protection strategies and what the future may hold BRASOV‚ Romania.&mdash Oct. 26‚ 2016 — The dynamics of cyber war and its effect on the national security landscape will be addressed during an upcoming lecture, “The Art of Cyber War,” Oct. 27 and 28. Comodo, a global innovator and developer …
SANTA CLARA‚ Calif.&mdash Oct. 26‚ 2016 — Zero–day malware – new malware that has never been seen before – continues to plague businesses of all sizes. Millions of these unknown files are being crafted or modified each year. They cannot be detected by existing security systems; they hide on endpoints and networks and remain among the …
SANTA CLARA‚ Calif.&mdash Oct. 26‚ 2016 — Zero–day malware – new malware that has never been seen before – continues to plague businesses of all sizes. Millions of these unknown files are being crafted or modified each year. They cannot be detected by existing security systems; they hide on endpoints and networks and remain among the …
Session to explore the challenges of weaving cybersecurity into national security worldwide WASHINGTON, D.C.– Oct. 21, 2016 — The ever-increasing challenges of effectively weaving cybersecurity into national security plans across the globe will be addressed in an upcoming session at CyCon U.S. 2016, hosted by the Army Cyber Institute at West Point and NATO Cooperative Cyber Defence …
Read Infosecurity Magazine article about Comodo John Peterson insights on Vera Bradley payment card data breach
Read Kenneth Geers, Comodo’s senior research scientist, commentary on assessing the threat of Russia hacking the US election.
SANTA CLARA‚ Calif.&mdash Oct. 11‚ 2016 — Comodo‚ a global innovator and developer of cybersecurity solutions‚ today announced that it will team with Jon Oltsik‚ senior principal analyst at Enterprise Strategy Group (ESG)‚ for a webinar focused on protecting enterprises from sophisticated ransomware attacks. As part of National Cyber Security Awareness Month‚ Oltsik will join Comodo Senior …
RIGA, Latvia– Oct. 5, 2016 — Helping researchers dissect and defend against the advanced persistent threats (APTs) used in cyberwar is the focus of an upcoming session at Cyberchess 2016, hosted by CERT.LV and held as part of European Cyber Security Month. Comodo, a global innovator and developer of cybersecurity solutions, today announced that Senior Research Scientist …
RIGA, Latvia– Oct. 5, 2016 — Helping researchers dissect and defend against the advanced persistent threats (APTs) used in cyberwar is the focus of an upcoming session at Cyberchess 2016, hosted by CERT.LV and held as part of European Cyber Security Month. Comodo, a global innovator and developer of cybersecurity solutions, today announced that Senior Research Scientist …
Read New York Times article about Kenneth Geers analysis on Russia’s cyber attacks
Read Fast Company article about John Peterson insights on Yahoo breach.
Read CIO’s review about Comodo
Read Network World’s review about Comodo
Read Investor’s Business Daily article about Kenneth Geers’ analysis of the Ukrainian conflict.
Read SC Magazine article to find out why NATO cyber defense ambassador reflects on cyberwarfare’s ethics.
Read The Guardian article on why Cyberwar is already in the US.
Read The Register story on why cyberspace has been declared the world’s most powerful military alliance.
Read Investor’s Business Daily article on Dr. Kenneth Geers’ discussion on why cyberwar exists and why it is on the rise.
Read Small Business Computing article to find out more about SSL certificates.
Read the Infosecurity story about a new malware campaign that targets Amazon users. The Comodo Labs team found the malware.
Read eSecurity Planet story on the Linkedin Breach, which included commentary from Comodo John Peterson on why companies of different sizes need endpoint security, breach detection and secure gateway.
Read Tech News World story which includes Comodo’s Daniel Korsunsky take on why the gang behind TeslaCrypt ransomware surrendered the decryption key for free.
Read Beta News story on the LinkedIn password leak and Comodo’s John Peterson offers key perspective on cybersecurity issues related to the IT environment.
Read Credit Union Times story and see what Comodo’s John Peterson has to say on delay breach notifications.
Read Credit Union Times feature story on the latest email breaches targeting financial institutions, manufacturing and retail companies. Comodo John Peterson offers his perspective on advance endpoint protection and why companies of all sizes are at risk for cyberattack.
A thought leadership article by Comodo’s John Peterson was published in IT Pro Portal on the next generation approach for Advanced Persistent Threats.
Channelnomics.com highlighted Comodo’s latest updates to the Comodo One MSP platform
Clifton, NJ, April 29, 2016 — The Comodo organization, a global innovator and developer of cybersecurity solutions, today announced availability of its next version of its free Comodo IT management platform, Comodo One MSP (version 3.1). Comodo One MSP (formerly known as Comodo ONE) is a version of the Comodo One integrated IT management platform that …
CLIFTON, NJ, April 26, 2016 — The Comodo organization, a global innovator and developer of cybersecurity solutions, today announced that its Advanced Endpoint Protection solution has been awarded the 2016 Best Anti Malware Solution of the Year by the Cybersecurity Excellence Awards Association. The Cybersecurity Excellence Awards (http://cybersecurity-excellence-awards.com) honor companies and individuals that demonstrate excellence, innovation …
Comodo Advanced Endpoint Protection Named Best Anti Malware Solution of the Year Read More »
New publication to promote thought leadership, highlight industry trends and issues and discuss solutions to fight cybercrime CLIFTON, NJ, April 22, 2016 — The Comodo organization, a global innovator and developer of cybersecurity solutions, today launched DEFEND, a new online magazine designed to be the cybersecurity insider’s go-to source for the industry’s latest news and trends. DEFEND has …
Comodo Announces Launch of New Cybersecurity Online Magazine “DEFEND” Read More »
A thought leadership article by Comodo’s Dr. Phillip Hallam-Baker was published in IoT Innovator on why cybersecurity is important in the age of the Internet of Things.
Read the SHRM.org story on security issues related to thumb drives, and what Comodo’s Robin Alden has to say about the cybersecurity issues that come with those drives.
CUTimes.com has a feature story on one of the latest Trojans hitting financial services organizations. Comodo’s John Peterson offers his perspective on advanced endpoint protection and why banks and financial services organizations are at risk for cyberattack.
Byline article by Comodo on the science behind ransomware.
Read the Beta News feature story which talks about business and consumer security advice to stay clear of phishing attacks for the forthcoming U.S. tax day deadline.
CLIFTON, NJ, April 12, 2016 — The Comodo organization, a global innovator and developer of cybersecurity solutions, today announced a new case study has been published, focused on how Syneteks in Colorado, USA is leveraging the free Comodo One MSP platform to better service and support its customer base. Said Mr. Gary Galbreath, Partner at Syneteks: “For any …
Syneteks Leverages the Free Comodo One MSPIT Platform to Support its Customer Base Read More »
Softpedia runs a feature story on the hacking of US agencies and Comodo’s John Peterson offers key perspective on security trends and tips on how to protect an IT environment.
Clifton, NJ — April 6, 2016 WHO: A global innovator and developer of cybersecurity solutions, Comodo is the world’s largest certificate authority1 in the world, providing groundbreaking advanced endpoint protection, security and IT management solutions. WHAT: Comodo will be showcasing Comodo 360 — one of the industry’s only fully Specialized Threat Analysis and Protection (STAP) compliant …
Read the ISMG News feature story on the Trump data breach, where Comodo’s Zach Forsyth offers his perspective on why the hospitality industry overall has become a main target for cybercriminals. The story appeared across the ISMG family of sites including Data Breach Today.com, Bank Info Security.com, CU Info Security.com, Info Risk Today.com, and Gov …
ISMG NEWS: TRUMP HOTELS BREACHED AGAIN (COMMENTARY BY COMODO INCLUDED) Read More »
Read the Infosecurity Magazine story about Trump Hotels being hacked again and why Comodo’s Zach Forsyth thinks industries like hospitality and hotels remain an ideal target for cybercriminals.
Read the Softpedia.com story where Comodo’s Zach Forsyth is featured talking about why the hospitality industry is a key target of the cybercriminal, and why current technologies many have in place are not working