The Real Cost of Data Breaches
Internet security insider/technology visionary Melih Abdulhayoglu discusses the far-reaching costs of data breaches, and the probability that they will increase as dependence on e-commerce increases.
View ArticleWhy I’m Cutting up My Credit Card
Internet security insider/technology visionary Melih Abdulhayoglu becomes a victim of the Heartland Payments Breach.
View ArticleIs it a $20 Bill or a Post-It Note?
Internet security insider/technology visionary Melih Abdulhayoglu asks a a seemingly silly question that has a really serious answer, particularly for people who shop online.
View ArticleHackers got more than 285M records in 08
Internet security insider/technology visionary Melih Abdulhayoglu shares some bad news with you about the significant number of personal records being stolen by hackers.
View ArticleEV SSL – Extended Validation SSL Certificates
Comodo extended validation or EV SSL is the trust and security feature for your site that can improve conversion , reduce abandonment and increase revenue. According to a recent study of us internet...
View ArticlePCI(Payment Card Industry) Compliance by Comodo
The data security standards set by the Payment Card Industry (PCI) are not optional measures to follow for anyone who accepts, processes, or stores credit card data. As a PCI Security Standards Council...
View ArticleTrust must be at the core of Web 3.0
Internet security insider/technology visionary Melih Abdulhayoglu explains why trust, rather than technology must be at the core of “Web 3.0″
View ArticleSSL – A false sense of security
Internet security insider/technology visionary Melih Abdulhayoglu describes how the yellow SSL padlock we’re accustomed to seeing on secure web pages is losing its meaning due to the proliferation of...
View ArticleEV SSL – Fast Validation Tips
Helpful tips for getting through Extended Validation SSL (EV SSL) validation quickly and easily.
View ArticleEV SSL – ComodoVision E-Merchant 1
Semi-monthly news magazine for E-Merchants on Internet Trust and Security. This edition focuses on PCI Compliance and includes a special offer to attend the IRCE where comodo will be exhibiting June...
View ArticleEV SSL Case Study – SpaLook.com
Executives from www.SpaLook.com, one of the most trusted sources for beauty essentials describe the role of trust and security in driving business results. Hear their perspective on how SpaLook builds...
View ArticleComodo Disk Encryption
This video illustrates how Comodo Disk Encryption protects the private and sensitive data stored on PC’s – particularly mobile ones or portable storage devices like flash drives from being accessed,...
View ArticleEV SSL Case Study – RC & Me
Tim Danielewicz, owner and operator of the highly successful online hobby shop RC and Me Hobbies shares his experience and advice about running a successful e-merchant business, including improving...
View ArticleDesktop Security Funny Video – Be Responsible Laptop
You’ve heard of the marital woes of Jon and Kate Gosselin. Here’s an even more troubled relationship: a stressed-out man and a laptop WITHOUT antivirus software.
View ArticleMobile Device Data Breaches
Several recent data breaches at major enterprises and governmental agencies stemmed from the loss or theft of mobile computers and USB drives. While encrypting the data on these devices isn’t a bad...
View ArticleCompliance Does Not Equal Security
Responsibility for the notorious Heartland Payment Systems data breach late last year has been debated recently, with Heartland’s CEO suggesting that their PCI auditors let the firm down, while the...
View ArticlePayment Card Industry (PCI) Security Compliance – Are You at Risk? Part 1
Excellent overview of the underlying issues and players (including criminal hackers) relating to PCI Compliance, a case study of a small business that got hacked, and what busiesses of all sizes can do...
View ArticlePayment Card Industry (PCI) Security Compliance – Are You at Risk? Part 2
Excellent overview of the underlying issues and players (including criminal hackers) relating to PCI Compliance, a case study of a small business that got hacked, and what busiesses of all sizes can do...
View ArticleComodo.TV Now on iTunes
Comodo.TV is now available through the iTunes store! Just type “ComodoVision” in the search box or click here to download our videos for free.
View ArticleComodo Trustmarks
Comodo Trustmarks deliver real-time identity assurance to site visitors, helping to establish trust and confidence between merchants and customers. Building a trust relationship with your visitors has...
View ArticleComodo Code Signing Certificates
Use Comodo Code Signing Certificates as a “virtual shrinkwrap” to assure your customers that your software is the real deal, and hasn’t been altered or corrupted. Find out more here. Comodo Code...
View ArticleComodo Multi-Domain Certificates
Use Comodo Multi-Domain Certificates to secure multiple websites from a single certificate.
View ArticleSSL – Wildcard SSL by Comodo
Learn how you can secure unlimited subdomains over multiple servers on a single Comodo Wildcard SSL certificate. Click here to learn more!
View ArticleEV SSL ComodoVision E-Merchant 2
Semi-monthly news magazine for E-Merchants on Internet Trust and Security. This edition covers: the potential brand damage facing e-merchants due to phishing and how e-merchants can effectively combat...
View ArticleSSL Certificates by Comodo
Comodo’s popular business validated SSL Certificate provides strong encryption and visual assurance for conducting business online. Among the most affordable and inclusive SSL Certificates available...
View ArticleFree SSL Certificates by Comodo
Learn about Comodo’s Free SSL certificate, trusted by over 99% of browsers. For more information click here.
View ArticleIntroduction by Howard Schmidt, Newly Appointed United States White House...
United States President Barack Obama has chosen Howard Schmidt to be the White House Cybersecurity Coordinator. He is a leading authority on computer security, with some 40 years of experience in...
View ArticleComodo HackerProof PCI Scanning, Vulnerability Scanning and Trustmark
HackerProof is a revolutionary vulnerability scanning and trust building tool that helps overcome the security concerns of your visitors. It includes an interactive Trustmark to build trust on every...
View ArticleComodo KillSwitch Demo at RSA Conference
Watch live streaming video from comodotvlive at livestream.com
View ArticleComodo ESM 2.0 Business Edition Demo
Glen Marianko, Product Manager — Provides a preview of the future release of Endpoint Security Manager 2.0 Business Edition Endpoint Security Manager 2.0 Business Edition; centrally manages the...
View ArticlePartner Testimonial: Tripp Technologies
Are you looking to build the trust of your customers while offering them solutions that are GUARANTEED to prevent against virus infection? Stephen Tripp, President of Tripp Technologies in Portland,...
View ArticlePartner Secure Testimonial: Computer Corner
Comodo Partner Secure values the relationships that we have with our resellers. In this video you will hear from Mitchell Clay, Owner of Computer Corner in Pocahontas, Arkansas, to learn about how...
View ArticleHow to Scam People Using Hypnosis in NYC
See how a New York City Street Vendor shows off his techniques in how to scam random people by selling cheap plastic goods for hundreds of dollars. Even if they didn’t carry money on them, he waits for...
View ArticleHey retailers! That’s how to protect your customers’ credit card data
Comodo offers SecureBox to enhance a secure connection between the endpoints and servers. SecureBox reduces any fraudulent attack and data breaches. Signup from https://securebox.comodo.com/
View ArticleCode Signing Certificate at an Affordable Price | Increase Trust in Your Code
Protect your codes from malware tampering and increase trust in your code with Comodo Code Signing Certificate at an affordable price. For more information,visit...
View Article2048 Bit Root Key SSL Certificates
The US Government National Institute of Standards and Technology (NIST) recommends that all certificates issued from 2010 onward use 2048 bit keys. Find out why.
View ArticleNew Comodo Internet Security 10 (CIS 10) with Secure Shopping features.
Brand New CIS 10 with true security for online banking and shopping. A look into features like Secure Shopping, application unblocking, the brand new interface, and web installers. To download CIS 10 :...
View Article[Part 1] Exploiting 3rd Party Data Breaches By Comodo Trip Nine From
Comodo’s Trip Nine explains Different Forms of vulnerabilities, that are categorized into third party data breach, direct zero day exploits. hackers use simple tar file to start the attack. Learn More...
View Article[Part 2] How Hacker uses third party data to exploit company Explains Trip...
Trip Nine of Comodo address how a hacker would take company data and encrypt password easily. Learn More : https://www.comodo.com/
View Article[Part 3] Comodo’s Breach Analysis report For 3rd Party Data Breaches
Comodo’s Global Breach Analysis report will allow you to find and query in information that matches domain of your company. Learn More : https://www.comodo.com/
View Article
More Pages to Explore .....