Hi [[ session.user.profile.firstName ]]

Comodo Cybersecurity

  • Date
  • Rating
  • Views
  • Weighing the Cost of Data Security: Why It’s Important for All Business Sizes
    Weighing the Cost of Data Security: Why It’s Important for All Business Sizes Chase Cunningham, Forrester Analyst and John Macintosh, Enterprise Systems Engineer with Comodo Cybersecurity Recorded: Jul 24 2018 44 mins
    The digital landscape is doubling in size every two years. By 2020, the data we create and copy annually will reach 44 zettabytes, or 44 trillion gigabytes.* With so much data to manage, one of the biggest challenges is knowing where sensitive data resides – on an endpoint? On a file server? In transit? Or possibly in the hands of a competitor or a bad actor. Only by building context around your most sensitive data will you gain a better understanding of how to protect, prioritize, lock down, and monitor your data, and to avoid damaging data breaches.
    Join Chase Cunningham, Analyst with Forrester and Kevin Santarina, Senior Systems Engineer with Comodo Cybersecurity as they discuss why data protection is a necessary addition to every organization’s security portfolio. Learn how you can:
    •Understand the structure and location of your organization’s high value data
    •Analyze the movement and storage of sensitive data across your network and beyond
    •Protect sensitive information from exposure by employees and third parties
    •Build an action plan to enforce a least privileged model and remediate when sensitive data is overexposed

    *Source: IDC Study 2014
  • 3 Things To Know About Comodo's Threat Intelligence Report
    3 Things To Know About Comodo's Threat Intelligence Report Comodo Cybersecurity Recorded: Jul 23 2018 2 mins
    The Comodo Threat Intelligence Lab monitors, filters and contains, and analyzes malware, ransomware, viruses and other "unknown" potentially dangerous files 24x7x365 in over 190 countries around the world. With 5 offices spread across the Americas, Asia, and Europe (and staff covering over 190 countries), the Lab is made up of more than 120 IT security professionals, ethical hackers, computer scientists and engineers (all full-time Comodo Lab employees) analyzing millions of potential pieces of malware, phishing, spam or other malicious/unwanted files and emails every day. The Comodo Threat Intelligence Lab also works with trusted partners in academia, government and industry to gain additional insights into known and potential threats.

    For More Information: https://bit.ly/2LdXdnr
  • World Map of Malware: The Geography of Hostile Code
    World Map of Malware: The Geography of Hostile Code Dr. Kenneth Geers, Chief Research Scientist Comodo Cybersecurity Recorded: Jul 17 2018 55 mins
    Zero-day malware--new malware that has never been seen before-- continues to plague businesses of all sizes. Millions of these unknown files are being crafted or modified each year. They cannot be detected by existing security systems; they hide on endpoints and networks and remain among the most important and effective tools hackers use.

    Join Chief Research Scientist at Comodo Cybersecurity and NATO Cooperative Cyber Defense Centre of Excellence Ambassador, Dr. Kenneth Geers as he analyzes how geopolitical events affect malware in the world's hottest cyber-attack zones. Webinar attendees will learn:
    • How cyber defenders benefit from spending more time on strategic cyber defense analysis.
    • Why cities, countries, continents, verticals and even geopolitical events have their own malware fingerprint.
    • How threat research and intelligence can quickly provide actionable intelligence to Network Security professionals at the tactical level.

    The session draws on data from Comodo Cybersecurity's Threat Intelligence Team's analysis of 300 million malware incidents in the first six months of 2018 and how you can leverage this technology to enhance your IT infrastructure.
  • How Adding Layers of Perimeter Defense Can Render Attacks Useless
    How Adding Layers of Perimeter Defense Can Render Attacks Useless Rob Ayoub, IDC & Gus Evangelakos, Director of Sales Engineering at Comodo Cybersecurity Recorded: Jun 28 2018 52 mins
    As more businesses embrace digital transformation and migrate to the cloud, they must also address the cybersecurity risks inherent in those opportunities. Given the pace at which cyber-threats evolve, it's simply not possible to detect and stop every threat that enters the network before it does damage. Join IDC analyst, Rob Ayoub and Comodo Cybersecurity’s Director of Sales Engineering, Gus Evangelakos on June 28th at 1pm ET. You will walk away from this webinar knowing:
    • Current cyber threat landscape
    • The benefits of layered perimeter defense to protect the LAN
    • How you can render attacks useless leveraging innovative cybersecurity technology
    • How to protect your users without limiting productivity
    • Strengthen your organization’s security posture
  • Comodo Cybersecurity: Render Attacks Useless
    Comodo Cybersecurity: Render Attacks Useless Comodo Cybersecurity Recorded: Jun 26 2018 2 mins
    Trojans, and other malicious “wares” generate approximately one million new specimens of hostile software every day. Although many cybersecurity vendors will promise full protection against threats —the truth is, they can’t, no one can. Businesses and people must accept that malware cannot be successfully blocked 100% of the time. As a leader in cybersecurity for over twenty years, Comodo Cybersecurity seeks to protect businesses by understanding the true nature of the digital environment and what malware needs to survive.
  • How Comodo's Containment Technology Renders Malware Useless
    How Comodo's Containment Technology Renders Malware Useless Rik Turner, Ovum Asaf Ashirov, Comodo Cybersecurity Recorded: May 22 2018 49 mins
    Are you still relying on traditional antiviruses and antimalware for protection? You might be at risk.
    Threat labs around the world detect over 1 million new strains of malware every single day. On top of this, cybersecurity experts have ruled signature-based detection used in most commercial antiviruses and anti-malware only catch 30% to 40% of these malicious applications. These programs should not be your only line of defense against the latest threats.
    Join Ovum Senior Analyst Rik Turner and Comodo Cybersecurity Product Marketing Manager Asaf Ashirov as they discuss the latest security threats, the risks they pose, and their solutions. When you join us, you will also learn about auto-containment, a cutting edge integrated platform of technologies that protect against the most advanced threats across all network layers.

Embed in website or blog