Skip links

Comodo

Xcitium

Comodo Security Solutions Rebrands to Xcitium – August 2022

Comodo Security Solutions Rebrands to Xcitium Launches Patented Zero Threat Endpoint Protection to Eliminate Growing Threats Comodo Security Solutions today announced a rebranding to Xcitium, as the company launches its patented zero threat endpoint technology to combat an increase in ransomware and other malware across all industries. Xcitium Zero Threat is the only solution on the […]

Malware

The Malware Plague – Part 1

The Malware Plague Malicious software—commonly referred to as malware—is used by threat actors to perform malicious activities on a host system. These malicious activities include compromising the corporate network, identity theft, and data exfiltration. The evolution of connected devices and the fact that it has become practically impossible to run an enterprise without a computer […]

Microsoft Ignite

Microsoft Ignite After Party – Online and free MSIgnite 2021

Microsoft Ignite After Party

I will be hosting an after party at Microsoft Ignite and all of you are virtually invited

Details are below

When : Wednesday . November 3

Via Zoom / Ring Central

Join us here : Click here

What is a Microsoft Ignite After Party?

  • A Microsoft Ignite After Party is a Watch Party where you invite your community members to come together to watch a pre-selected Ignite session together, spark conversations around the topic, bringing our content closer them.
  • The recommended duration for the After Party is 60-90 minute session.
  • You may kick off with watching the pre-selected session together.
  • After the session is viewed, a technical discussion is led by the host fostering 2-way conversation and Q&A for deeper dive into the content.
  • Remember, After Parties should be held during a designated time period – in this case, from November 2021 to January 2022, after the Microsoft Ignite event

If you miss this event , you can find more here 

Continue reading Microsoft Ignite After Party – Online and free MSIgnite 2021

Kernel API Virtualization by Comodo Erdal

Kernel API Virtualization by Comodo – Uncovered (1)

Kernel API Virtualization by Comodo When it comes to securing your enterprise endpoints, it’s important to have a foundational understanding that there are three types of files: the good, the bad and the unknown. Approaches such as Antivirus (both vendor-branded “next gen” and legacy detection-based), Blacklisting and Whitelisting handle the known good and the bad […]

Inspire Keynote Speaker Ozkaya

Inspire speaker at Arab Emerging technologies & Startups conference

I will be presenting the keynote at the Arab EmTech & Startups Conference which focuses on how organizations or Startups in the Arab World are rethink and transform not only businesses but also the life of its residents. In order to prepare for the future, transform their businesses, and gain a competitive advantage. And Making Cybersecurity […]

Erdal Ozkaya in the News

GISEC spotlights critical infrastructure, cybersecurity automation -Join for FREE 2021

GISEC 21 spotlights critical infrastructure cybersecurity automation By Mark Ferranti : https://www.cio.com/article/3620284/gisec-spotlights-critical-infrastructure-cybersecurity-automation.html A massive move to remote work and rising geopolitical tensions that threaten critical infrastructure have caused many a sleepless night for CIOs and CSOs in the Middle East over the past year. They are also giving technology leaders gathering this week in Dubai […]

Comodo Community Trusted Advisor Dr Erdal ozkaya

Comodo Community Trusted Advisor : 2020 Award

This is a very auspicious moment for me to announce one more milestone in my career: It’s a great honor for me to be the first “Comodo Community Trusted Advisor” which will be global community of #cybersecurity experts who passionately share their knowledge. The Comodo Community Trusted Advisor Program is designed to honor zealous cybersecurity professionals […]

Erdal Ozkaya

Cloud Alliance Cybersecurity Interview – watch 4 free

Attack Surface Reduction

Applying Attack Surface Reduction – 1

Applying Attack Surface Reduction First some definitions/terminologies so that we all know what we are talking about Threat Actor: A threat actor or malicious actor is a person, entity or an object responsible for an event or incident that impacts, or has the potential to impact, the safety or security of another entity. In Cybersecurity […]

Explore
Drag