Dr. Erdal Ozkaya
Search
  • Home
  • About Dr Erdal Ozkaya, Erdal in the news
  • Comodo target last 1% of cyber threats putting South Africa firms at risk

Comodo target last 1% of cyber threats putting South Africa firms at risk

Erdal Ozkaya in the News
Erdal2021-06-16T15:54:52-04:00

Pinnacle’s new cyber security division has partnered with Comodo Cybersecurity to offer managed service providers a solution that blocks unknown cyber threats putting organizations at risk in South Africa.

Announcing the new opportunity for South African MSPs during a webinar held in partnership with ITWeb, Joseph Jaghab, Head of Partnerships at Comodo Cybersecurity, noted: “You will never prevent 100% of malware from entering your network.”

He said traditional security approaches can achieve a 99% detection rate, but there remains a 1% gap representing all the unknowns, with thousands of pieces of undetected malware daily.

Jaghab said Comodo prevented unknowns from entering the native environment, but allowed them to access an auto-containment vault – a replicated space within the kernel of the endpoint. “Unlike a sandbox, this is extremely lightweight and robust compared to a full VM, the process is fully automated, and the end-user will be able to safely access any unknown file, so productivity is not hindered.

The auto-containment works with Valkyrie (Comodo’s threat intelligence) to run a dynamic analysis, he said. “Ninety-five percent of the time, we determine if a file is good or bad in under 45 seconds. If Valkyrie can’t make a determination in that timeframe, our SOC team is available to make an analysis. They will reverse engineer that file in under four hours.”

Dr Erdal Ozkaya, CISO at Comodo Cybersecurity, said cyber security had changed and cyber risk had increased over the past year, making it all the more important for organisations to address the 1% gap presented by unknown threats. “Our world has changed – it is not the same world it was just two years ago as a result of COVID-19,” he said. “The way we live, communicate and work – and even the way we get hacked – has changed.

Everyone believes they have the best cyber security solutions – unfortunately they aren’t aware of what is happening in the cyber security landscape. Not a day goes past without news of a hack. There are now two types of organisations – those who know they have been hacked, and those who don’t. Going forward there will also be two kinds of organisations – those implementing the right steps and cyber security tools, and those who make it into the news.”

The Comodo Cybersecurity opportunity for local MSPs is designed to make it easy to onboard and manage security for customers. It includes Dragon Enterprise Platform and Auto Containment – the world’s only active breach protection that renders malware, ransomware and cyber attacks useless – and the Comodo SOCaaP managed threat detection and response service backed by Comodo’s in-house security operations centre and security information and event management.

For more information, go to https://www.pinnacle.co.za/comodo.

Joining Comodo Cybersecurity as CISO

https://www.erdalozkaya.com/comodo-ciso/

THE STORY OF COMODO SECURITY SOLUTIONS (CSS), INC

In a world where preventing all cyberattacks is impossible, Comodo delivers an innovative cybersecurity platform that renders threats useless across the LAN, web and cloud.

The Comodo Dragon platform enables customers to protect their systems and data against even military-grade threats, including zero-day attacks. It is highly effective at addressing the onslaught of ransomware. Based in Clifton, New Jersey, CSS has a 20-year history of protecting the most sensitive data for businesses and consumers globally. In 2018, CSS embarked on a journey to be the leader in endpoint security.

Today, CSS technology is precise, vigorous, and tailored to solve problems without downtime or undue stress. It renders an almost immediate verdict on the status of any unknown file to be handled accordingly by either software or human analysts. This shift from reactive to proactive makes CSS unique. It allows the capacity to protect all domains of business activity and threat—from network to web to cloud—with confidence and efficacy.

This fast and competent technology provides a seamless user experience and promotes ongoing customer trust. And, it recognizes a vital reality: while you cannot prevent 100% of malware – you can render malware useless.

Comodo Cybersecurity

Comodo’s Mission Statement :https://www.comodo.com/comodo-cybersecurity/

AfricaSecurity

Cybersecurity Symposium Africa 2020. (Cape Town) 

https://www.erdalozkaya.com/keynote-at-cybersecurity-symposium-uct/

How Hackers Get your Password?

It’s not a secret anymore, Hackers know our passwords.  551,509,767 real-world passwords previously exposed in data breaches. Are you one of those victims? Has your email been compromised or found in a data breach so far? How do hackers get your passwords? In this article, I am going to write the common methods which hackers use to steal your passwords and then I will recommend you the industry best practices to keep you or at least your passwords safe ?

Mass Theft

This is the most convenient way for hackers, instead of hacking 10.000 people, they hack a vulnerable web site, which has all the information they need. Yes, I know this sounds hard but in reality, it’s not. Just recently (3 April 2019) more than 540 million records which included extensive details, including people’s comments, likes, names, and Facebook IDs were found in Amazon unprotected. (plain text) (You can Read here the details )

Hackers can also steal “hashes”, like in 2012, LinkedIn was saving their user database unsalted, which means “a random data was not used as an additional input to a one-way function that hashes data, a password or passphrase. Salting in cryptography is used to safeguard passwords; keeping it short they had no extra safeguard implemented to protect the passwords)

To read the full article : https://www.erdalozkaya.com/how-hackers-get-your-password/

Cybersecurity Solutions

cyber threats putting South Africa firms at risk- Comodo target last 1% of cyber threats putting South Africa firms at risk – Comodo Cybersecurity- Comodo target last 1% of cyber threats putting South Africa firms at risk -cybersecurity opportunity for local MSP-Cybersecurity South Africa- Pinnacle cyber security division -blocks unknown cyber threats- Comodo target last 1% of cyber threats-Pinnacle’s new cyber security division-safeguard passwords- COMODO SECURITY SOLUTIONS- CSS

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Related Posts

Experts covered Cybersecurity end to end Erdal

Experts covered Cybersecurity end to end : 1

Experts covered Cybersecurity end to end The First Global Cybersecurity Research Center Conference was held in Istanbul, Turkey this year, and... read more
Cybersecurity Bootcamp Erdal Ozkaya

Intelligent security is key to fight sophisticated threats

Intelligent security is key to fight sophisticated threats By : Adelle Geronim tahawultech.com/ Intelligent security is increasingly becoming vital as GCC CISOs... read more
Thank you Standard Chartered Bank Dr Ozkaya

Top speakers dominate World CIO 200 Summit 2019 -mega event in UAE

Top speakers dominate World CIO The Global CIO Forum concluded its 14 country – The World CIO 200 Summit road show on 09-10 December... read more
How to learn cyber security here are the necessary basics

How to learn cybersecurity, Great Tips from Italy

How to learn cybersecurity, Great Tips from Italy My books are getting recommended by teh popular Italian Security Web site thanks... read more
Conscientious Achiever , Erdal Ozkaya

Conscientious Achiever , Erdal Ozkaya 2010

Conscientious Achiever, From Australian Turkish Business Council Newsletter and Web site  About ATBC ? The Australian Turkish Business Council is a not-for-profit... read more

How CISOs can reduce risk? Empower your knowledge for free 2021

How CISOs can reduce risk? Interview with Intelligence CIO Magazine : Cyberthreats are increasing in volume and complexity across the Middle... read more
Cost of a Data Breach Erdal Ozkaya

Understanding the cost of a cybersecurity attack: (2019) free yourself from hackers

Understanding the cost of a cybersecurity attack The average cost of a cybersecurity attack has been increasing over time. The rewards... read more
Türkiye Bilişim Derneği Antalya Şubesi

Türkiye Bilişim Derneği Antalya Şubesi – Erdal in the news Jan 2023

Türkiye Bilişim Derneği Antalya Şubesi Last week I was in Antalya which is the capital city of Tourism in Türkiye /... read more
KSA CISO Leaders

FutureSec Summit Saudi Arabia by Khaleej Times – Free 0nline Event

FutureSec Summit Saudi Arabia by Khaleej Times -Free 0nline Event The growth of the digital world has opened business opportunities for... read more

emt Distribution appoints new CISO (2015)

emt Distribution appoints new CISO By JAMES DARTNELL via emt Distribution appoints new CISO https://www.tahawultech.com/resellerme/news/emt-distribution-appoints-new-ciso/ IT security products distributor emt Distribution has announced... read more

Categories

  • About Dr Erdal Ozkaya (300)
    • Awards (97)
    • Erdal in the news (121)
    • Feedback (88)
    • My Books (53)
    • Who is Dr Erdal Ozkaya ? (2)
  • Announcemets (305)
  • Artificial Intelligence AI (11)
  • Certification (52)
  • Cloud Computing (73)
  • Cybersecurity (325)
  • Cybersecurity Leadership (58)
  • Digital Transformation (2)
  • Financial Sector (31)
  • Forensics (17)
  • Free Events (166)
  • General (138)
  • How to …? (61)
  • ISO 2700x (12)
  • News (38)
  • Reviews (77)
    • Book Reviews (32)
    • Free E-Books (14)
    • Hardware Review (9)
    • Security Review / Reports (10)
    • Software Review (8)
  • Siber Güvenlik (17)
  • Video Tutorials (101)
  • What is new? (27)
  • Windows (30)

Recent Comments

  • Sabri Kızmaz on Finans Sektörü Odaklı Siber Tatbikat
  • celal bayar on Finans Sektörü Odaklı Siber Tatbikat
  • Erdal on Free EDR Certification Training
  • SANDEEP SHRIVASTAV on Free EDR Certification Training
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)

Archives

Dr. Erdal Ozkaya © Copyright 2023. All Rights Reserved.