Plato Data Intelligence.
Vertical Search & Ai.

Tag: incident response

$31 Million Worth of Cryptocurrency Stolen in Cyber Attack

Reading Time: 3 minutesIf you trade in cryptocurrency, your funds probably aren’t safe in a public exchange. On June 19th, Bithumb, one...

Bithump Hacked- $31 Million Worth of Cryptocurrency Stolen

Reading Time: 3 minutesIf you trade in cryptocurrency, your funds probably aren’t safe in a public exchange.On June 19th, Bithumb, one of...

Here’s What I Learned at RSAC 2018 | Comodo Cybersecurity

Reading Time: 4 minutesThe RSA Conference is one of the biggest events in the world of cybersecurity. I wasn’t there this year,...

Here’s What I Learned at RSAC 2018

Reading Time: 4 minutesThe RSA Conference is one of the biggest events in the world of cybersecurity. I wasn’t there this year, but...

Top 10 Effective Endpoint Security | Comodo Endpoint Protection

Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security...

Best 10 Features of an Effective Endpoint Security Strategy

Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security measures...

Top 10 Features of an Effective Endpoint Security Strategy 2020

Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security...

Endpoint Security Glossary | Comodo Endpoint Protection

Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection-AAdvanced Persistent Threat (APT) – An unauthorized person...

Endpoint Security Glossary

Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection- A Advanced Persistent Threat (APT) – An unauthorized person gaining...

Boost Your MSP Revenue by Becoming an MSSP

Reading Time: 3 minutesYou work in IT services, so you are well aware that the demand for security, especially among small- and mid-sized...

NSA Report: Defensive Best Practices for Destructive Malware

Reading Time: 2 minutesThe National Security Agency (NSA)’s Information Assurance Directorate has released a report on “Defensive Best Practices for Destructive Malware”. The...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?