Quantcast
Channel: E-merchant – Comodo TV
Browsing latest articles
Browse All 47 View Live

The Real Cost of Data Breaches

Internet security insider/technology visionary Melih Abdulhayoglu discusses the far-reaching costs of data breaches, and the probability that they will increase as dependence on e-commerce increases.

View Article



Why I’m Cutting up My Credit Card

Internet security insider/technology visionary Melih Abdulhayoglu becomes a victim of the Heartland Payments Breach.

View Article

Is it a $20 Bill or a Post-It Note?

Internet security insider/technology visionary Melih Abdulhayoglu asks a a seemingly silly question that has a really serious answer, particularly for people who shop online.

View Article

Hackers got more than 285M records in 08

Internet security insider/technology visionary Melih Abdulhayoglu shares some bad news with you about the significant number of personal records being stolen by hackers.

View Article

EV SSL – Extended Validation SSL Certificates

Comodo extended validation or EV SSL  is the trust and security feature for your site that can improve conversion , reduce abandonment and increase revenue. According to a recent study of us internet...

View Article


PCI(Payment Card Industry) Compliance by Comodo

The data security standards set by the Payment Card Industry (PCI) are not optional measures to follow for anyone who accepts, processes, or stores credit card data. As a PCI Security Standards Council...

View Article

Trust must be at the core of Web 3.0

Internet security insider/technology visionary Melih Abdulhayoglu explains why trust, rather than technology must be at the core of “Web 3.0″

View Article

SSL – A false sense of security

Internet security insider/technology visionary Melih Abdulhayoglu describes how the yellow SSL padlock we’re accustomed to seeing on secure web pages is losing its meaning due to the proliferation of...

View Article


EV SSL – Fast Validation Tips

Helpful tips for getting through Extended Validation SSL (EV SSL) validation quickly and easily.

View Article


EV SSL – ComodoVision E-Merchant 1

Semi-monthly news magazine for E-Merchants on Internet Trust and Security. This edition focuses on PCI Compliance and includes a special offer to attend the IRCE where comodo will be exhibiting June...

View Article

EV SSL Case Study – SpaLook.com

Executives from www.SpaLook.com, one of the most trusted sources for beauty essentials describe the role of trust and security in driving business results. Hear their perspective on how SpaLook  builds...

View Article

Comodo Disk Encryption

This video illustrates how Comodo Disk Encryption protects the private and sensitive data stored on PC’s – particularly mobile ones or portable storage devices like flash drives from being accessed,...

View Article

EV SSL Case Study – RC & Me

Tim Danielewicz, owner and operator of the highly successful online hobby shop RC and Me Hobbies shares his experience and advice about running a successful e-merchant business, including improving...

View Article


Desktop Security Funny Video – Be Responsible Laptop

You’ve heard of the marital woes of Jon and Kate Gosselin. Here’s an even more troubled relationship: a stressed-out man and a laptop WITHOUT antivirus software.

View Article

President Obama on Cybersecurity

View Article


Mobile Device Data Breaches

Several recent data breaches at major enterprises and governmental agencies stemmed from the loss or theft of mobile computers and USB drives. While encrypting the data on these devices isn’t a bad...

View Article

Compliance Does Not Equal Security

Responsibility for the notorious Heartland Payment Systems data breach late last year has been debated recently, with Heartland’s CEO suggesting that their PCI auditors let the firm down, while the...

View Article


Payment Card Industry (PCI) Security Compliance – Are You at Risk? Part 1

Excellent overview of the underlying issues and players (including criminal hackers) relating to PCI Compliance, a case study of a small business that got hacked, and what busiesses of all sizes can do...

View Article

Payment Card Industry (PCI) Security Compliance – Are You at Risk? Part 2

Excellent overview of the underlying issues and players (including criminal hackers) relating to PCI Compliance, a case study of a small business that got hacked, and what busiesses of all sizes can do...

View Article

Comodo.TV Now on iTunes

Comodo.TV is now available through the iTunes store! Just type “ComodoVision” in the search box or click here to download our videos for free.

View Article

Why Don’t Scammers Wear Pencil Mustaches?

View Article


President Obama’s Cybersecurity Awareness Month Message

View Article


Comodo Trustmarks

Comodo Trustmarks deliver real-time identity assurance to site visitors, helping to establish trust and confidence between merchants and customers. Building a trust relationship with your visitors has...

View Article

Comodo Code Signing Certificates

Use Comodo Code Signing Certificates as a “virtual shrinkwrap” to assure your customers that your software is the real deal, and hasn’t been altered or corrupted. Find out more here. Comodo Code...

View Article

Comodo Multi-Domain Certificates

Use Comodo Multi-Domain Certificates to secure multiple websites from a single certificate.

View Article


SSL – Wildcard SSL by Comodo

Learn how you can secure unlimited subdomains over multiple servers on a single Comodo Wildcard SSL certificate. Click here to learn more!

View Article

EV SSL ComodoVision E-Merchant 2

Semi-monthly news magazine for E-Merchants on Internet Trust and Security. This edition covers: the potential brand damage facing e-merchants due to phishing and how e-merchants can effectively combat...

View Article

SSL Certificates by Comodo

Comodo’s popular business validated SSL Certificate provides strong encryption and visual assurance for conducting business online. Among the most affordable and inclusive SSL Certificates available...

View Article

Searching for Evil

View Article



Free SSL Certificates by Comodo

Learn about Comodo’s Free SSL certificate, trusted by over 99% of browsers. For more information click here.

View Article

Introduction by Howard Schmidt, Newly Appointed United States White House...

United States President Barack Obama has chosen Howard Schmidt to be the White House Cybersecurity Coordinator. He is a leading authority on computer security, with some 40 years of experience in...

View Article

Interview with White House Cybersecurity Coordinator Howard Schmidt

View Article

Comodo HackerProof PCI Scanning, Vulnerability Scanning and Trustmark

HackerProof is a revolutionary vulnerability scanning and trust building tool that helps overcome the security concerns of your visitors. It includes an interactive Trustmark to build trust on every...

View Article


Comodo Highlights

A quick look at the history of Comodo.

View Article

How To Install Your Comodo TrustLogo

Learn how to install your Comodo TrustLogos.

View Article

Comodo KillSwitch Demo at RSA Conference

Watch live streaming video from comodotvlive at livestream.com

View Article


Comodo ESM 2.0 Business Edition Demo

Glen Marianko, Product Manager — Provides a preview of the future release of Endpoint Security Manager 2.0 Business Edition Endpoint Security Manager 2.0 Business Edition; centrally manages the...

View Article


Partner Testimonial: Tripp Technologies

Are you looking to build the trust of your customers while offering them solutions that are GUARANTEED to prevent against virus infection? Stephen Tripp, President of Tripp Technologies in Portland,...

View Article

Partner Secure Testimonial: Computer Corner

  Comodo Partner Secure values the relationships that we have with our resellers. In this video you will hear from Mitchell Clay, Owner of Computer Corner in Pocahontas, Arkansas, to learn about how...

View Article

How to Scam People Using Hypnosis in NYC

See how a New York City Street Vendor shows off his techniques in how to scam random people by selling cheap plastic goods for hundreds of dollars. Even if they didn’t carry money on them, he waits for...

View Article

Hey retailers! That’s how to protect your customers’ credit card data

Comodo offers SecureBox to enhance a secure connection between the endpoints and servers. SecureBox reduces any fraudulent attack and data breaches. Signup from https://securebox.comodo.com/

View Article


Code Signing Certificate at an Affordable Price | Increase Trust in Your Code

Protect your codes from malware tampering and increase trust in your code with Comodo Code Signing Certificate at an affordable price. For more information,visit...

View Article

2048 Bit Root Key SSL Certificates

The US Government National Institute of Standards and Technology (NIST) recommends that all certificates issued from 2010 onward use 2048 bit keys.  Find out why.

View Article


New Comodo Internet Security 10 (CIS 10) with Secure Shopping features.

Brand New CIS 10 with true security for online banking and shopping. A look into features like Secure Shopping, application unblocking, the brand new interface, and web installers. To download CIS 10 :...

View Article

[Part 1] Exploiting 3rd Party Data Breaches By Comodo Trip Nine From

Comodo’s Trip Nine explains Different Forms of vulnerabilities, that are categorized into third party data breach, direct zero day exploits. hackers use simple tar file to start the attack. Learn More...

View Article


[Part 2] How Hacker uses third party data to exploit company Explains Trip...

Trip Nine of Comodo address how a hacker would take company data and encrypt password easily. Learn More : https://www.comodo.com/

View Article

[Part 3] Comodo’s Breach Analysis report For 3rd Party Data Breaches

Comodo’s Global Breach Analysis report will allow you to find and query in information that matches domain of your company. Learn More : https://www.comodo.com/

View Article
Browsing latest articles
Browse All 47 View Live




Latest Images