Hi [[ session.user.profile.firstName ]]

Comodo Cybersecurity: Render Attacks Useless

Trojans, and other malicious “wares” generate approximately one million new specimens of hostile software every day. Although many cybersecurity vendors will promise full protection against threats —the truth is, they can’t, no one can. Businesses and people must accept that malware cannot be successfully blocked 100% of the time. As a leader in cybersecurity for over twenty years, Comodo Cybersecurity seeks to protect businesses by understanding the true nature of the digital environment and what malware needs to survive.
Recorded Jun 26 2018 2 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Comodo Cybersecurity
Presentation preview: Comodo Cybersecurity: Render Attacks Useless

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Zero Trust Cybersecurity: Learn The 5 Steps To Breach-Proof Your Business Recorded: Aug 15 2019 22 mins
    Gus Evangelakos, Director of Field Engineering, Comodo Cybersecurity
    Is Zero Trust right for your organization’s infrastructure and challenges? Join us for this important and informative event as we explore Zero Trust and the unique approach to policy and technology that makes it one of the fastest-growing cybersecurity trends today.


    • Why Zero Trust is being called the “breach-proof” cybersecurity solution

    • Ramifications and requirements for your organization

    • Why it’s easier than you think — you may already be practicing some elements of Zero Trust now

    • The 5 steps to implementing Zero Trust and what they mean in practical terms
  • The Role of Malware in Intelligence Operations Recorded: Oct 25 2018 59 mins
    Dr. Kenneth Geers, Chief Research Scientist Comodo Cybersecurity
    Imagine you are King or Queen for a day. How would you employ the time and talent of computer hackers? Whom would you target, with what type of malware, and for what purpose? Where would you set technical, legal, and ethical constraints? This presentation will examine the role of malicious software in real-world nation-state intelligence operations. Information Technology continuously transforms the nature of statecraft, from external threats to internal security. Please join noted author and speaker, Dr. Kenneth Geers as he will clarify:
    •The roles and risks of law enforcement, counterintelligence, and foreign intelligence operations in the Internet era
    •We will consider the attack and defense of everything in a modern state, from elections to electricity
    •And we will discuss how enterprises can and should respond to a threat that has no fear of prosecution or retaliation
  • LEARN IT: Detect and Prevent Known and Unknown Malware in Real-Time Recorded: Oct 15 2018 57 mins
    Fernando Montenegro and Gus Evangelakos
    New malware specimens emerge every 4.2 seconds and real-world enterprise networks encounter unknown or suspicious files every 1-2 seconds.

    However, only a fraction of those malicious files are detected by mainstream endpoint security tools, based upon existing malware signatures and behavioral profiles. The rest – unknown files carrying viruses, trojans, worms and other infections – slip through most defenses, undetected.

    Join 451 Research Analyst Fernando Montenegro and Comodo Cybersecurity expert Gus Evangelakos to learn more about the evolving cyber-threat landscape and how IT security professionals can leverage innovative cybersecurity technology.

    This webinar will highlight:

    -The ups and downs of machine learning, static and dynamic malware analysis in the cloud and on your endpoints
    -The benefits of putting a human analyst in the loop to achieve 100% verdicting for unknown files
    -Auto-containment technology – achieving default-deny security with default-allow productivity
    -Valkyrie, the Comodo Cybertechnology cloud-based threat intelligence and verdicting engine

    Information security professionals, threat analysts and cybersecurity experts are encouraged to attend. There will be time for live Q&A with Fernando Montenegro and Comodo Threat Intelligence experts at the end of the session.
  • Hacking Democracy: A Strategic Correlation of Elections and Malware Recorded: Oct 4 2018 61 mins
    Dr. Kenneth Geers, Chief Research Scientist Comodo Cybersecurity
    In politics today, there is no hotter topic than election hacking. Information technology is vulnerable, the Internet is global, and hackers rarely get caught. Therefore, politicians, soldiers, and spies have every incentive to leverage malware in an effort to tip the polls their way. Nonetheless, election hacking has been difficult to prove. At a minimum, security researchers need at least one of two things: tactical forensics acquired at the local level, or strategic analysis of a global dataset. The research presented in this webinar takes the latter approach. Comodo Cybersecurity's Chief Research Scientist, Dr. Kenneth Geers, will examine

    - In-country malware detection in the context of dozens of national-level elections held over the past 18 months
    - Detected malware types and families for each election, using both timelines and geolocation.

    This research serves as a warning for the upcoming U.S. Election in November 2018. First, it demonstrates a strong correlation between modern elections and malware. Second, it shows security administrators what kind of malware they are most likely to see during a campaign – and when.
  • Weighing the Cost of Data Security: Why It’s Important for All Business Sizes Recorded: Jul 24 2018 44 mins
    Chase Cunningham, Forrester Analyst and John Macintosh, Enterprise Systems Engineer with Comodo Cybersecurity
    The digital landscape is doubling in size every two years. By 2020, the data we create and copy annually will reach 44 zettabytes, or 44 trillion gigabytes.* With so much data to manage, one of the biggest challenges is knowing where sensitive data resides – on an endpoint? On a file server? In transit? Or possibly in the hands of a competitor or a bad actor. Only by building context around your most sensitive data will you gain a better understanding of how to protect, prioritize, lock down, and monitor your data, and to avoid damaging data breaches.
    Join Chase Cunningham, Analyst with Forrester and Kevin Santarina, Senior Systems Engineer with Comodo Cybersecurity as they discuss why data protection is a necessary addition to every organization’s security portfolio. Learn how you can:
    •Understand the structure and location of your organization’s high value data
    •Analyze the movement and storage of sensitive data across your network and beyond
    •Protect sensitive information from exposure by employees and third parties
    •Build an action plan to enforce a least privileged model and remediate when sensitive data is overexposed

    *Source: IDC Study 2014
  • 3 Things To Know About Comodo's Threat Intelligence Report Recorded: Jul 23 2018 2 mins
    Comodo Cybersecurity
    The Comodo Threat Intelligence Lab monitors, filters and contains, and analyzes malware, ransomware, viruses and other "unknown" potentially dangerous files 24x7x365 in over 190 countries around the world. With 5 offices spread across the Americas, Asia, and Europe (and staff covering over 190 countries), the Lab is made up of more than 120 IT security professionals, ethical hackers, computer scientists and engineers (all full-time Comodo Lab employees) analyzing millions of potential pieces of malware, phishing, spam or other malicious/unwanted files and emails every day. The Comodo Threat Intelligence Lab also works with trusted partners in academia, government and industry to gain additional insights into known and potential threats.

    For More Information: https://bit.ly/2LdXdnr
  • World Map of Malware: The Geography of Hostile Code Recorded: Jul 17 2018 55 mins
    Dr. Kenneth Geers, Chief Research Scientist Comodo Cybersecurity
    Zero-day malware--new malware that has never been seen before-- continues to plague businesses of all sizes. Millions of these unknown files are being crafted or modified each year. They cannot be detected by existing security systems; they hide on endpoints and networks and remain among the most important and effective tools hackers use.

    Join Chief Research Scientist at Comodo Cybersecurity and NATO Cooperative Cyber Defense Centre of Excellence Ambassador, Dr. Kenneth Geers as he analyzes how geopolitical events affect malware in the world's hottest cyber-attack zones. Webinar attendees will learn:
    • How cyber defenders benefit from spending more time on strategic cyber defense analysis.
    • Why cities, countries, continents, verticals and even geopolitical events have their own malware fingerprint.
    • How threat research and intelligence can quickly provide actionable intelligence to Network Security professionals at the tactical level.

    The session draws on data from Comodo Cybersecurity's Threat Intelligence Team's analysis of 300 million malware incidents in the first six months of 2018 and how you can leverage this technology to enhance your IT infrastructure.
  • How Adding Layers of Perimeter Defense Can Render Attacks Useless Recorded: Jun 28 2018 52 mins
    Rob Ayoub, IDC & Gus Evangelakos, Director of Sales Engineering at Comodo Cybersecurity
    As more businesses embrace digital transformation and migrate to the cloud, they must also address the cybersecurity risks inherent in those opportunities. Given the pace at which cyber-threats evolve, it's simply not possible to detect and stop every threat that enters the network before it does damage. Join IDC analyst, Rob Ayoub and Comodo Cybersecurity’s Director of Sales Engineering, Gus Evangelakos on June 28th at 1pm ET. You will walk away from this webinar knowing:
    • Current cyber threat landscape
    • The benefits of layered perimeter defense to protect the LAN
    • How you can render attacks useless leveraging innovative cybersecurity technology
    • How to protect your users without limiting productivity
    • Strengthen your organization’s security posture
  • Comodo Cybersecurity: Render Attacks Useless Recorded: Jun 26 2018 2 mins
    Comodo Cybersecurity
    Trojans, and other malicious “wares” generate approximately one million new specimens of hostile software every day. Although many cybersecurity vendors will promise full protection against threats —the truth is, they can’t, no one can. Businesses and people must accept that malware cannot be successfully blocked 100% of the time. As a leader in cybersecurity for over twenty years, Comodo Cybersecurity seeks to protect businesses by understanding the true nature of the digital environment and what malware needs to survive.
  • How Comodo's Containment Technology Renders Malware Useless Recorded: May 22 2018 49 mins
    Rik Turner, Ovum Asaf Ashirov, Comodo Cybersecurity
    Are you still relying on traditional antiviruses and antimalware for protection? You might be at risk.
    Threat labs around the world detect over 1 million new strains of malware every single day. On top of this, cybersecurity experts have ruled signature-based detection used in most commercial antiviruses and anti-malware only catch 30% to 40% of these malicious applications. These programs should not be your only line of defense against the latest threats.
    Join Ovum Senior Analyst Rik Turner and Comodo Cybersecurity Product Marketing Manager Asaf Ashirov as they discuss the latest security threats, the risks they pose, and their solutions. When you join us, you will also learn about auto-containment, a cutting edge integrated platform of technologies that protect against the most advanced threats across all network layers.
Delivering innovative cybersecurity to render attacks useless
In a world where preventing all cyberattacks is impossible, Comodo Cybersecurity provides active breach protection with its cloud-delivered Cybersecurity Platform. The Comodo Cybersecurity Platform provides a zero trust security environment that verdicts 100% of unknown files. The platform renders an almost immediate verdict on the status of any unknown file, so it can be handled accordingly by either software or human analysts. This shift from reactive to proactive is what makes Comodo Cybersecurity unique and gives us the capacity to protect your business – from network to web to cloud – with confidence and efficacy.
Comodo has experts and analysts in 185 countries, protecting 100 million endpoints and serving 200,000 customers globally. Based in Clifton, New Jersey, Comodo Cybersecurity has a 20-year history of protecting the most sensitive data for both businesses and consumers worldwide.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Comodo Cybersecurity: Render Attacks Useless
  • Live at: Jun 26 2018 7:05 pm
  • Presented by: Comodo Cybersecurity
  • From:
Your email has been sent.
or close