Welcome!

Virtualization - Data Storage - Security

Katharine Hadow

Subscribe to Katharine Hadow: eMailAlertsEmail Alerts
Get Katharine Hadow via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Katharine Hadow

Comodo Backup Encrypts and Safeguards Data, Optimizes File Space Jersey City, NJ, November 03, 2009 - In October, Sidekick users experienced the acute distress of losing their data files—apparently forever. If corporate networks lose information, their pain is magnified. The number and size of the files lost may be thousands or millions times greater. The loss may even kill the patient, shutting down a business permanently. Comodo Backup 2.1 protects against data loss crises by taking real-time backups of user data, with more flexibility and control than ever, and still for free. New features in Comodo Backup include step-by-step wizards to guide even novice users through the entire backup, restore and scheduling procedures, and real-time backups. The synchronization feature creates real-time backups by copying files over as soon as they are modified. Granular schedul... (more)

Comodo Says Send Email, Not Postcards Scrawled in Pencil

"If it's urgent enough to send in a business email, it's usually something you don't want others to see," said Melih Abdulhayoglu, Chief Security Architect and CEO of Comodo Group, Inc., a leading Internet security company. "Most emails are not secure messages. To a moderately skilled person, inside the organization or out, they are as easy to read or even to change, as a postcard written in pencil." Emails do not reach their recipients directly. The senders have no control over the route their emails take, from server to server, to their destinations. Anyone between the sender a... (more)

The Economist Reports on Cyber Warfare

"Do cyberattacks count as warfare?" in The Economist's Technology Quarterly (December, 2008) explores confusion surrounding botnet attacks on political entities.  What kind of crime are they, and how should governments react?  Read it now--after December, 2009, access is only for Economist print subscribers. ... (more)

Remote Centralized Security Suite Reduces Reliance on Sneakernet

Keeping the security settings on just one PC up to date is a chore. Where PC networks span hundreds of computers, it can be a full-time job for their network administrator. New features of Comodo Endpoint Security Manager 1.4 make managing network security easier. Hackers look for the holes in security software. When they find holes, they write malicious code to attack. When security software developers detect the malicious code, they update their security software, which must then be installed on each PC. As the company that develops award-winning security software, Comodo is aw... (more)

FederalComputerWeek Reports on Digital Requirements of Stimulus Package

White House Issues Guidance on Stimulus Bucks  by Doug Beizer, in Federal Computer Week. ... (more)