• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

Biometric authentication data at risk

Biometric authentication data at risk

Estimated reading time: 3 minutes

You walk up to your car and the door opens on its own. You don’t need to turn the ignition – the car has already recognized you. You stop at a shop and pick out some breakfast. For payment,...
Read Blog
February 12, 2019
14
Shares

Brute-force attacks – Traditional but still Effective

Brute-force attacks – Traditional but still Effective

Estimated reading time: 2 minutes

Brute-force attacks can probably be regarded as the first word in the alphabet of cybersecurity. Among the oldest ways of trying to gain unauthorized access to an account, brute-force attacks have been around forever. But the fact that despite...
Read Blog
February 7, 2019
24
Shares

MaaS Moving Towards APT as a Service?

MaaS Moving Towards APT as a Service?

Estimated reading time: 3 minutes

We have all heard about the dark web. It’s that mysterious part of the Internet which can’t be accessed normally, which is not indexed on a search engine and contains all the illegal activities that are taking place. Whether...
Read Blog
February 5, 2019
9
Shares

Data Security Compliance for NBFCs

Data Security Compliance for NBFCs

Estimated reading time: 3 minutes

Non-bank financial institutions (NBFIs) or non-bank financial companies (NBFCs) have been an integral part of the Indian financial system. These are financial institutions that do not have a banking license or regulated by an agency but can still carry...
Read Blog
December 20, 2018
19
Shares

Why should you say NO to ransomware demands!

Why should you say NO to ransomware demands!

Estimated reading time: 3 minutes

Ransomware is scary. Anyone who has ever been the victim of a ransomware attack or seen the havoc WannaCry unleashed, would agree. And it is not a threat that seems to be going away anytime soon – the European...
Read Blog
December 3, 2018
8
Shares

Tracing the story of Emotet malware campaign

Tracing the story of Emotet malware campaign

Estimated reading time: 3 minutes

For any enterprise which has some sort of association with the financial sector, it is important to be familiar with the threat of Emotet. Yes, Emotet, a part of the banking Trojan family which is distributed through various different...
Read Blog
December 1, 2018
15
Shares

Your business is hit by a breach. Now what should you do?

Your business is hit by a breach. Now what should you do?

Estimated reading time: 3 minutes

The worst has happened. Your database has been breached and the company is scrambling for cover. Every second seems to be a time bomb and your IT security team is working overtime, trying to assess the damage. Your CEO...
Read Blog
November 26, 2018
11
Shares

Beware of these 5 scams this holiday season!

Beware of these 5 scams this holiday season!

Estimated reading time: 3 minutes

It’s the season of the holidays. Of fun, celebration and festivity. With just one hitch: cyber threats. The unfortunate fact is that cybercriminals are not on a holiday. They are continuously searching for ways in which they can damage...
Read Blog
November 20, 2018
11
Shares

Everything you need to know about RBI’s Circular on Basic Security Framework for Primary UCBs

Everything you need to know about RBI’s Circular on Basic Security Framework for Primary UCBs

Estimated reading time: 4 minutes

The recent spate of cyber-attacks on banks in India has left everyone worried. For those who haven’t kept count, Pune-based Cosmos Bank recently saw a massive security breach where Rs 94 crore was siphoned off. In a similar incident,...
Read Blog
November 12, 2018
27
Shares

The true cost of a data breach

The true cost of a data breach

Estimated reading time: 3 minutes

Data breaches are bad news. Whether it’s the CEO, the CISO or a network administrator, data breaches represent a significant threat which can have potentially catastrophic consequence. The threat of data breaches has only increased in recent years leading...
Read Blog
October 26, 2018
11
Shares
← Previous 1 … 17 18 19 … 42 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (331) cyber security (34) Cyber threat (33) cyber threats (49) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) mobile device management (11) Network security (23) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (36) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies