Plato Data Intelligence.
Vertical Search & Ai.

Tag: start

IKARUSdilapidated Locky Part II | Comodo Threat Intelligence Lab

Reading Time: 4 minutesShould you fear your office scanner/printer? How about your post office?A second wave of new but related IKARUSdilapidated Locky...

Tom Eyre, CEO of nooli

In support of the upcoming FinTech Growth Forum on September 19th, we are delighted to feature a series of profiles with some of the...

Steve Polsky of Juvo

Today’s profile is with Steve Polsky, founder of Juvo, whose vision is to establish financial identities for the billions of people worldwide who are...

Comodo | Making Sense of Endpoint Malware Protection Technology

Reading Time: 2 minutesDownload the latest newsletter from Comodo featuring Gartner research to learn how to make sense of endpoint malware protection...

Frank Sanchez of Finxact

Today we are talking to Frank Sanchez of the cloud based SaaS banking software company Finxact. Here’s Frank with his answers to our...

Security has to start and end with trust.

Reading Time: 1 minuteWhen you use a company’s security solution, you are placing your reputation in their hands, and you must trust their...

Cyber Security of a firm starts and ends with Trust

Reading Time: 1 minuteWhen you use a company’s security solution, you are placing your reputation in their hands, and you must trust...

Endpoint Security | Money Being wasted on Ineffective Solutions

Reading Time: 3 minutesThere are endpoint security solutions but there are better endpoint security solutions.There are so many endpoint security solutions available...

How Artificial Intelligence is changing the SaaS Landscape

There is no one moment when SaaS – Software as a Service – was conceived, because SaaS as a concept has a host...

Dr Mark Goldspink of the ai Corporation (ai)

This week on FinTech Profile, we talk to Dr Mark Goldspink, CEO of The ai Corporation (ai) Founded in 1998, ai has a long...

The Evolution of SSL and TLS | Comodo Blog

Reading Time: 3 minutesSSL and TLS are often used interchangeably as they are closely related. Both are online communication protocols and serve...

5 Simple Steps to Avoid a Certificate Outage Disaster | Webminar

Reading Time: 1 minuteJoin cybersecurity experts Kevin Deickmann and Jason Boone for a free webinar on Wednesday, August 16 to learn how...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?