• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

Protect sensitive information with Seqrite Encryption

Protect sensitive information with Seqrite Encryption

Estimated reading time: 3 minutes

Among the most important assets that an enterprise possesses, data is undoubtedly the most important. In today’s digital age, there are reams of data being processed, transmitted and disseminated every millisecond and much of the world’s economy runs on...
Read Blog
July 3, 2019

Key benefits of Seqrite Secure Web Gateway

Key benefits of Seqrite Secure Web Gateway

Estimated reading time: 2 minutes

Enterprises are recently waking up to the usefulness of having layered protection for their networks. This involves investing in various layers of protection such as anti-virus, anti-malware, anti-spyware and a firewall. However, firewalls while providing protection can often fall...
Read Blog
June 27, 2019

Make Seqrite UTM the first line of defense for your enterprise

Make Seqrite UTM the first line of defense for your enterprise

Estimated reading time: 2 minutes

Network security has traditionally been a number one priority for enterprises. As the reliance on the Internet has increased, enterprises have invested in traditional network security solutions which aim to protect trusted internal networks from external actors. For this...
Read Blog
June 20, 2019

Harnessing Machine Learning and Automation against Advanced Threats

Harnessing Machine Learning and Automation against Advanced Threats

Estimated reading time: 2 minutes

With the specter of advanced cybersecurity threats always on the horizon, enterprises are seriously considering harnessing the power of machine learning and automation to fight against these threats. For good reason too – a cybersecurity survey suggested that organizations...
Read Blog
June 12, 2019

How to build a strong cloud network security strategy

How to build a strong cloud network security strategy

Estimated reading time: 2 minutes

While enterprises often focus on building strong, robust cybersecurity interfaces for their in-house networks, cybersecurity for cloud networks is a whole different ballgame. Yet, enterprises cannot avoid the advantages of doing their business on the cloud – the sheer...
Read Blog
June 10, 2019

Rise of cyber-physical attacks

Rise of cyber-physical attacks

Estimated reading time: 3 minutes

It was back in 2012 when the then Defense Secretary of the United States warned of the possibility of the country facing a “cyber-Pearl Harbor”. He painted a bleak possibility – that extremist groups and enemy nations would use...
Read Blog
May 27, 2019

Seqrite Endpoint Security supports the Windows 10 May 2019 Update

Seqrite Endpoint Security supports the Windows 10 May 2019 Update

Estimated reading time: 2 minutes

As part of the Windows 10 Updates, Microsoft has now come up with a new update for Windows 10 PCs. It’s called Windows 10 19H1 (Windows 10 May 2019 Update). This post lists down some of the highlights of...
Read Blog
May 23, 2019

Cybersecurity roundup – Jan to April ‘19

Cybersecurity roundup – Jan to April ‘19

Estimated reading time: 2 minutes

2019 is not even halfway over and there is already a flurry of cyber attacks all over the globe. Network administrators and cybersecurity experts have to always be on their toes as, no one is safe from the risk...
Read Blog
May 22, 2019

What is Emotet?

What is Emotet?

Estimated reading time: 4 minutes

Emotet malware was first identified in 2014 as Banking trojan. Emotet has evolved from banking trojan to threat distributor till now. It has hit many organizations very badly in 2018 with its functionalities like spamming and spreading. Further with...
Read Blog
May 21, 2019

5 Cyber Security Best Practices For Your Small to Medium-Size Business

5 Cyber Security Best Practices For Your Small to Medium-Size Business

Estimated reading time: 2 minutes

Small to medium-sized businesses often tend to underestimate cybersecurity. The reasons range from practicality – they may not have the resources, to sheer over-confidence – the notion that they are not important enough to be at risk of cybersecurity...
Read Blog
May 9, 2019
← Previous 1 … 14 15 16 … 42 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (34) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies