• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: October 2020

Anyone, even you, can carry out cyberattacks with the Malware-as-a-Service model

Anyone, even you, can carry out cyberattacks with the Malware-as-a-Service model

Estimated reading time: 2 minutes

In an age where solutions like cloud, mobility, storage and security are offered as part of service models, it is to no surprise that malware also has its service offering, aptly called Malware-as-a-Service (MaaS)? Of course, there’s a misnomer...
Read Blog
October 30, 2020

Seqrite Endpoint Security Supports Windows 10 October 2020 Update 20H2

Seqrite Endpoint Security Supports Windows 10 October 2020 Update 20H2

Estimated reading time: < 1 minute

Microsoft has recently come up with a new update for Windows 10 PCs, called Windows 10 October 2020 Update (Build version 20H2). Here is the list of some highlights of this update and see how Seqrite Endpoint Security is compatible...
Read Blog
October 26, 2020

Could geopolitical tensions lead to large-scale cyberattacks?

Could geopolitical tensions lead to large-scale cyberattacks?

Estimated reading time: 2 minutes

The prospect of geopolitical tensions leading to large-scale cyberattacks is a very real one. Nor would it be a new development – nation-states have been using cyberattacks as a warfare technique for more than a decade now. Perhaps the...
Read Blog
October 23, 2020

Seqrite Endpoint Security Cloud Supports Windows 10 October 2020 Update

Seqrite Endpoint Security Cloud Supports Windows 10 October 2020 Update

Estimated reading time: 2 minutes

Microsoft has recently come up with a new update for Windows 10 PCs, called Windows 10 October 2020 Update (Build version 20H2). Here is the list of some highlights of this update and see how Seqrite Endpoint Security Cloud...
Read Blog
October 22, 2020

Attacks on the defence sector could prove very costly!

Attacks on the defence sector could prove very costly!

Estimated reading time: 2 minutes

In the current modern era of information warfare, securing military assets has become strategically very important. Recently, Seqrite reported on Operation ‘Honey Trap’, an operation launched by a Pakistan-linked threat actor allegedly, which targeted employees from Indian defence organizations....
Read Blog
October 16, 2020

Are you making these common public cloud migration mistakes?

Are you making these common public cloud migration mistakes?

Estimated reading time: 2 minutes

Enterprises are increasingly migrating operations to the public cloud, enthused by the many benefits it offers. By embracing cloud competencies, enterprises can become leaner and faster, enabling their employees to access information and services from wherever they are. It...
Read Blog
October 9, 2020

The Evergreen ‘Make’ Utility: A cost-effective way of deployments on Cloud.

The Evergreen ‘Make’ Utility: A cost-effective way of deployments on Cloud.

Estimated reading time: 2 minutes

It might be difficult to find a software engineer who does not know ‘Make’ utility. ‘GNU Make’ is a tool which controls the generation of executables and other stuff related to the application code building. Capabilities of ‘Make’ are...
Read Blog
October 1, 2020
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies