Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Art of Breach Detection Dr Erdal Ozkaya, CISO / Chief Cybersecurity Strategest, Comodo Cybersecurity Hackers will never stop their attack attempts, and organizations must be aware they could be breached any second! So tune into this presentation to di... 9 months ago | 53 mins How Comodo's Containment Technology Renders Malware Useless Rik Turner, Ovum Asaf Ashirov, Comodo Cybersecurity Are you still relying on traditional antiviruses and antimalware for protection? You might be at risk. Threat labs around the world detect over 1 mill... 5 years ago | 49 mins Comodo Cybersecurity: Render Attacks Useless Comodo Cybersecurity Trojans, and other malicious “wares” generate approximately one million new specimens of hostile software every day. Although many cybersecurity vend... 5 years ago | 2 mins 3 Things To Know About Comodo's Threat Intelligence Report Comodo Cybersecurity The Comodo Threat Intelligence Lab monitors, filters and contains, and analyzes malware, ransomware, viruses and other "unknown" potentially dangerous... 5 years ago | 2 mins How Adding Layers of Perimeter Defense Can Render Attacks Useless Rob Ayoub, IDC & Gus Evangelakos, Director of Sales Engineering at Comodo Cybersecurity As more businesses embrace digital transformation and migrate to the cloud, they must also address the cybersecurity risks inherent in those opportuni... 5 years ago | 52 mins Una plataforma para todo, una plataforma para todos Jorge Sanz - CRO (Chief Revenue Officer) de FacePhi y Andrés Labrador, Co-CEO de Moneta En FacePhi entendemos la biometría como un concepto transversal y accesible. Queríamos que además del usuario, tú también te sintieses cómodo y seguro... 9 months ago | 52 mins World Map of Malware: The Geography of Hostile Code Dr. Kenneth Geers, Chief Research Scientist Comodo Cybersecurity Zero-day malware--new malware that has never been seen before-- continues to plague businesses of all sizes. Millions of these unknown files are being... 5 years ago | 55 mins LEARN IT: Detect and Prevent Known and Unknown Malware in Real-Time Fernando Montenegro and Gus Evangelakos New malware specimens emerge every 4.2 seconds and real-world enterprise networks encounter unknown or suspicious files every 1-2 seconds. However... 4 years ago | 57 mins Advanced Malware Defense Workshop Jospeh Loveless, Director of Security Solutions at Neustar | Dexter Millan, Senior Security Engineer, Comodo Learn how to crush today's advanced malware attacks in this key cyber workshop 5 years ago | 60 mins Hacking Democracy: A Strategic Correlation of Elections and Malware Dr. Kenneth Geers, Chief Research Scientist Comodo Cybersecurity In politics today, there is no hotter topic than election hacking. Information technology is vulnerable, the Internet is global, and hackers rarely ge... 4 years ago | 61 mins