Reading Time: 28 minutesComodo One. Understanding monitors in ITSM
What is ‘Monitoring’ in ITSM profiles ?
Monitoring settings allow administrators to define performance and availability...
The tragic combination of inevitable bugs and immutable codeLast week witnessed a catastrophic event in the Ethereum ecosystem, when The DAO, a smart...
The three most common smart contract misconceptionsAs the developers of a popular blockchain platform, we sometimes get asked whether Ethereum-like smart contracts are...
Reading Time: 5 minutesSince 2013, the CryptoLocker malware has been making its way across the Internet in various forms, in various iterations. CryptoLocker...
Reading Time: 2 minutesOpenSSL has recently disclosed a high severity vulnerability that may require you to upgrade your version of OpenSSL.
Comodo anticipates this...
Reading Time: 3 minutesExtended Validation SSL Certificates are the most recent innovation in SSL Certificates. EV SSL certificates combat online threats that erode...
Reading Time: 2 minutesGoogle began complying this week with a European Court Ruling that recognizes an individual’s “Right to be Forgotten” online. The...