• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Seqrite is a leading enterprise cybersecurity solutions provider. With a focus on simplifying cybersecurity, Seqrite delivers comprehensive solutions and services through our patented, AI/ML-powered tech stack to protect businesses against the latest threats by securing devices, applications, networks, cloud, data, and identity. Seqrite is the Enterprise arm of the global cybersecurity brand, Quick Heal Technologies Limited, the only listed cybersecurity products and solutions company in India. Today, 30,000+ enterprises in more than 70+ countries trust Seqrite with their cybersecurity needs.

Seqrite Endpoint Encryption: The encryption that your business needs

Seqrite Endpoint Encryption: The encryption that your business needs

Estimated reading time: 3 minutes

With data becoming an organization’s most valuable asset, the need of the hour for businesses is encryption, to protect their sensitive data, keep up with legal considerations, abide by global compliance policies and safeguard customer interests. Encryption is hence...
Read Blog
July 16, 2018
23
Shares

Email-borne cyber attacks: A constant security threat

Email-borne cyber attacks: A constant security threat

Estimated reading time: 3 minutes

Since the invention of the World Wide Web in 1989 by Tim Berners-Lee, the technology has changed. What used to be a collection of simple text-based Usenet groups metamorphosed into multimedia and graphics. First email communication was all the...
Read Blog
July 12, 2018
5
Shares

Unstructured data: The unseen dangers

Unstructured data: The unseen dangers

Estimated reading time: 3 minutes

As the name suggests, unstructured data refers to raw and organized data that cannot be stored in predefined relationship structures. While this kind of data can be text-heavy in the form of email messages, PDFs, business plans, unstructured data...
Read Blog
July 6, 2018

Cybersecurity in international sporting events like the 2018 FIFA World Cup

Cybersecurity in international sporting events like the 2018 FIFA World Cup

Estimated reading time: 3 minutes

It is the season of the beautiful game. The world is tuned into the festival of football that is the 2018 FIFA World Cup in Russia. As some of the greatest superstars of the sport show off their skills...
Read Blog
July 3, 2018
9
Shares

Latest cyber threats you should know about

Latest cyber threats you should know about

Estimated reading time: 3 minutes

Cybersecurity threats are often like an ever-changing monster – you just can’t defeat it. A strong anti-virus solution with all the other necessary tools will help you secure your organization’s defense but it’s impossible to control what is happening...
Read Blog
June 26, 2018
9
Shares

5 Bad tech habits you need to work on

5 Bad tech habits you need to work on

Estimated reading time: 3 minutes

Businesses know the importance of cybersecurity. But do they know the importance of employees when it comes to cybersecurity? After all, a business’s employees offer the strongest defense against the varied manners of threats that exist in the cybersecurity...
Read Blog
June 25, 2018
8
Shares

Emerging Security Threats in Cloud Computing

Emerging Security Threats in Cloud Computing

Estimated reading time: 3 minutes

The worldwide cloud computing market is expected to grow to $191 billion by 2020. There are numerous advantages of cloud computing driving a move to the cloud; among them lower cost, faster time to market, and increased employee productivity. But what...
Read Blog
June 22, 2018
17
Shares

5 Poor security practices that endanger an IT organization

5 Poor security practices that endanger an IT organization

Estimated reading time: 3 minutes

Security is a habit. Like most human habit, it requires years of practice to form. The exception to this is the bad habits. Cybersecurity experts know that bad habits are intrinsically easy to slip into. It’s just easier for...
Read Blog
June 20, 2018
4
Shares

Blockchain: A brief introduction

Blockchain: A brief introduction

Estimated reading time: 3 minutes

Cryptocurrency is not just a fad anymore – it is a reality. Almost every day, there’s a new headline about Bitcoin and its recent surge or fall. And many of these articles use terms which might sound alien. One...
Read Blog
June 15, 2018

Using data governance and compliance to your advantage

Using data governance and compliance to your advantage

Estimated reading time: 3 minutes

Data is an asset. In this day and age, it is an incredibly valuable asset. Companies value their assets, and hence they should value data as well. Yet, the number of organizations which still do not give data its...
Read Blog
June 11, 2018
2
Shares
← Previous 1 … 21 22 23 … 43 Next →
Featured Authors
  • Seqrite
    Seqrite

    Seqrite is a leading enterprise cybersecurity solutions provider. With a focus...

    Read more..
  • Jyoti Karlekar
    Jyoti Karlekar

    I'm an avid writer who enjoys crafting content about emerging technologies and...

    Read more..
  • Bineesh P
    Bineesh P

    I am a passionate cybersecurity enthusiast and a dedicated writer. With a knack...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
Topics
apt (25) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (334) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (14) data protection (30) data security (15) DLP (49) DPDP (13) DPDPA (13) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (24) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) Seqrite (40) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (13) UTM (34) Vulnerability (16) zero trust (13)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies