Welcome!

Virtualization - Data Storage - Security

Katharine Hadow

Subscribe to Katharine Hadow: eMailAlertsEmail Alerts
Get Katharine Hadow via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Katharine Hadow

Malih Abdulhayoglu, in a column for SecurityFocus.com, urges readers to move away from traditional detection-based software and toward a prevention-based technology. http://www.securityfocus.com/columnists/492 ... (more)

The Economist Reports on Cyber Warfare

"Do cyberattacks count as warfare?" in The Economist's Technology Quarterly (December, 2008) explores confusion surrounding botnet attacks on political entities.  What kind of crime are they, and how should governments react?  Read it now--after December, 2009, access is only for Economist print subscribers. ... (more)

Attorneys Protect Email Communications with Comodo Secure Email

Patent-pending technology from Comodo allows attorneys and clients to communicate at the speed of the Internet and yet to protect their privileged communications easily. Without exchanging public keys, senders can encrypt confidential information in transit. Jersey City, NJ, May 05, 2009 - Attorneys sometimes need to transmit vast amounts of sensitive data, rapidly. If they choose to do so by email, they must consider that email, though convenient, is not secure Press release about Comodo Secure Email for Attorneys.. More information about Comodo Secure Email. ... (more)

Comodo Simplifies Administration of Secure Email Certificates

With great power comes great responsibility. The power to beam messages and business correspondence around the world has revolutionized communications. It has also given birth to a less glamorous responsibility: managing the encryption that makes email privacy and security possible. Comodo, a world leader in Internet trust, makes the use and management of secure email easy. Unless email is encrypted, anyone with access can read, and potentially change, its content or impersonate the true author. Encrypted email is generally exchanged after the recipients first share their digital ... (more)

Credit Unions Benefit from Comodo Two-Factor Authentication

Comodo's Two-factor Authentication process is popular with credit unions. Comodo's Two-Factor process can authenticate online banking customers with: Usernames and Passwords Digital certificates One-time Passwords (delivered via phone call, SMS and/or email) Optional Security Questions and Secure Cookies Comodo's solution is easy to install and integrates seamlessly with a credit union's existing website. After the customer has installed its digital certificate, the online banking process works just the way it did before, minimizing the learning curve. Comodo customers have exper... (more)