• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Sanjay Katkar
About Sanjay Katkar
Follow

Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of Quick Heal Technologies Limited. He holds a Masters in Computer Science from University of Pune, India. Sanjay has spearheaded the creation, subsequent development and maintenance of the core antivirus engine of Quick Heal. Over a span of 20 years, he has redesigned the entire product portfolio and elevated the role of the organization as a trustworthy IT security brand in more than 80 countries. He is a member of the Technology Steering Committee of National Security Database, India, and is a reporting member of The Wild List Organization International, USA. In 2016, Sanjay Katkar was named the Product Management Executive of the Year at the 12th Annual Global Excellence Awards overseen by Info Security Products Guide, a leading information security research and advisory guide, in San Francisco, USA.

How safe it is to use the Zoom video-conferencing app?

Zoom video-conferencing app becoming an attack channel

Estimated reading time: 3 minutes

Recently the Union home ministry has issued a warning raising a red flag for users of Zoom video-conferencing application and marked it as unsafe to use. Earlier, during the end of March, CERT-IN, India’s nodal cybersecurity agency had warned...
Read More
April 17, 2020

How to be a smart voter and not become a target of political campaigns on digital platforms

Estimated reading time: 3 minutes

The cornerstone of a democracy is voting. For any successful democracy to function properly, it is important to ensure that its people’s representatives are chosen fairly and justly. The obvious take-away then is that if voting as an exercise...
Read More
February 11, 2019
  • 29
    Shares

Can EVMs get hacked? We tell you the truth

Estimated reading time: 3 minutes

It is the season of elections. The New Year of 2019 will see elections in countries from as varied as Nigeria to Israel to the European Union. But closer home, the Indian General Elections which will be held in...
Read More
February 4, 2019
  • 420
    Shares

What are intra-state cyber threats and how to handle them?

Estimated reading time: 3 minutes

In the new information age we live in, cyber threats represent an ever-growing and dangerous form of intimidation and pressure. These threats represent a new tool of warfare and seek to reap chaos and distrust. While much attention is...
Read More
January 28, 2019
  • 8K
    Shares

What kind of cyber threats loom over elections?

Estimated reading time: 3 minutes

Election hacking is among the most controversial and hotly-debated topics of today. For good reason too, free and fair elections are one of the major elements that make up a democratic society. It’s one of the tools for a...
Read More
January 21, 2019
  • 8.1K
    Shares

What is the mystery about the Deep and Dark Web?

deep web

Estimated reading time: 3 minutes

Deep Web. Dark Web. Ransomware. Tor. Illegal activities. Bitcoin. A cursory search of the first two terms would reveal a range of web pages, all talking about the next four terms. The mystery and suspense the deep and dark...
Read More
June 19, 2018
  • 6
    Shares

Everything you need to know about the Facebook-Cambridge Analytica data breach

Facebook-Cambridge Analytica data breach

Estimated reading time: 4 minutes

Unless you have been living under a rock, you must have obviously heard of the name Cambridge Analytica and felt the reactions arising from the scandal which threatens to rock the giant of social networking, Facebook. Things are only...
Read More
March 26, 2018
  • 26
    Shares

Are we ready for Amazon’s automated grocery store?

Estimated reading time: 3 minutes

Welcome to the future, ladies and gentlemen. On January 22nd, on 2131, 7th Avenue in Seattle, Washington, the world got a taste of what the future could be like. The address saw the opening of the first Amazon Go...
Read More
February 27, 2018
  • 17
    Shares

Cybersecurity and cyber intelligence for a machine determined future

machine determined future, robots, AI, artificial intelligence

Estimated reading time: 3 minutes

With the world moving towards a machine determined future, somewhere deep within, it does bother many of us when we think about the power we intend to leave in the hands of machines. Honestly, some of us are worried...
Read More
September 25, 2017

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021
  • How can EdTech companies deal with rising security challenges?

    How can EdTech companies deal with rising security challenges?

    December 24, 2020

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (274) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (54) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.