• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

How can CISOs defend businesses from supply chain attacks?

How can CISOs defend businesses from supply chain attacks?

Estimated reading time: 3 minutes

A supply chain is an omnipresent and inseparable element in every business, irrespective of its size.  Hence, when it comes to cybersecurity specific to this aspect, simply protecting an enterprise’s periphery isn’t enough. Supply chains consist of people, logistics,...
Read Blog
November 18, 2019

Top five cybersecurity challenges for the CISO

Top five cybersecurity challenges for the CISO

Estimated reading time: 3 minutes

Thanks to increasing cyberthreats, the role of the Chief Information Security Officer (CISO) in an organization is only expanding. More and more CISOs are now part of senior leadership teams, reporting directly to the Chief Executive Officer. There is...
Read Blog
November 14, 2019

How much did cyberattacks cost organizations in 2018?

How much did cyberattacks cost organizations in 2018?

Estimated reading time: 3 minutes

In today’s day, it has become common knowledge that cyberattacks are dangerous for an organization. However, sometimes, people within the organization can differ on the exact impact of these threats. These differences can often blindside businesses on the total...
Read Blog
November 13, 2019

The past, present and future of cybersecurity

The past, present and future of cybersecurity

Estimated reading time: 3 minutes

The evolution of cybersecurity is both, fascinating and intriguing. Today’s cybersecurity professionals have immense responsibility and burden compared to yesteryears – they have to tackle with a wide range of cyberthreats such as malware, insider attacks & Distributed Denial...
Read Blog
November 12, 2019

The importance of cybersecurity for satellite communications

The importance of cybersecurity for satellite communications

Estimated reading time: 3 minutes

A  major part of human communications today is dependent on satellites. More so,  global navigation systems, military strategies, information collection, environment research, and even the internet are all dependent on the smooth functioning and continuous integration with these valuable...
Read Blog
November 8, 2019

The cybersecurity threats drones face and how to mitigate them

The cybersecurity threats drones face and how to mitigate them

Estimated reading time: 3 minutes

The global drone market is expected to rise to $43 billion in 2024, a huge rise from $14 billion in 2018. It is an indicator of the huge popularity surge in drones, technically known as unmanned aerial vehicles (UAVs)....
Read Blog
November 7, 2019

Dealing with cybersecurity threats in the age of autonomous vehicles

Dealing with cybersecurity threats in the age of autonomous vehicles

Estimated reading time: 3 minutes

In 2015, security researchers Charlie Miller and Chris Valasek remotely took control of a Jeep Cherokee vehicle as an experiment. By exploiting vulnerabilities in the vehicle’s Internet-connected entertainment and navigation systems, the two researchers activated the windshield wipers, turned...
Read Blog
November 6, 2019

The Seqrite Arsenal: Understanding how our solutions protect every aspect of the enterprise

The Seqrite Arsenal: Understanding how our solutions protect every aspect of the enterprise

Estimated reading time: 3 minutes

Seqrite is the enterprise security brand from Quick Heal, a leading IT security solutions company with over 25 years of experience in computer and network security solutions. Backed by Quick Heal’s cutting-edge expertise of producing cybersecurity solutions for more...
Read Blog
November 5, 2019

The seven key trends that define how cybersecurity is changing

The seven key trends that define how cybersecurity is changing

Estimated reading time: 3 minutes

Rounding up our content for the summit that just went by, it is evident that as the world enters a new decade, there will be a paradigm shift in cybersecurity. This shift is likely to be driven by a...
Read Blog
November 4, 2019

KKNPP Attack: Tracking the DTrack!

KKNPP Attack: Tracking the DTrack!

Estimated reading time: 2 minutes

The recent cyber-attack on Kudankulam Nuclear Power Plant (KKNPP) has been confirmed by the officials and yet again security of critical infrastructure has become the talk of the cyber world. The officials mentioned that there is no damage to...
Read Blog
November 1, 2019
← Previous 1 … 10 11 12 … 42 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies