• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Seqrite is a leading enterprise cybersecurity solutions provider. With a focus on simplifying cybersecurity, Seqrite delivers comprehensive solutions and services through our patented, AI/ML-powered tech stack to protect businesses against the latest threats by securing devices, applications, networks, cloud, data, and identity. Seqrite is the Enterprise arm of the global cybersecurity brand, Quick Heal Technologies Limited, the only listed cybersecurity products and solutions company in India. Today, 30,000+ enterprises in more than 70+ countries trust Seqrite with their cybersecurity needs.

Cryptocurrency- The Good, The Bad & The Ugly

Cryptocurrency- The Good, The Bad & The Ugly

Estimated reading time: 3 minutes

Cryptocurrency is the current buzzword of this day and age. Not a day goes by when there’s not a news item about cryptocurrency, either with warnings about its danger or breathless coverage of its fluctuating value. Without doubt, it’s...
Read Blog
February 6, 2018
4
Shares

Multi-Factor Authentication: Everything you need to Know

Multi-Factor Authentication: Everything you need to Know

Estimated reading time: 3 minutes

It wouldn’t be wrong to assume that login credentials and other confidential user-specific insights are the most frequently compromised data sets, extensively targeted by the malicious parties. Since 2017 witnessed hackers breaching 711 million users records; thereby accessing around...
Read Blog
February 5, 2018
5
Shares

How to defend your network against DDoS attacks?

How to defend your network against DDoS attacks?

Estimated reading time: 3 minutes

When it comes to enlisting the most unrecognizable forms of cyber-attacks, Distributed Denial of Service (DDoS) features on top of the pecking order. While DDoS attacks started off as simple and volumetric threats for creating disruptions, they have amplified...
Read Blog
January 31, 2018

Cybersecurity: How to approach a broader perspective at the board level

Cybersecurity: How to approach a broader perspective at the board level

Estimated reading time: 3 minutes

The dangers that cyber threats pose have never been as apparent as now. High-profile organizations have been at the receiving end, there has been both reputational and financial damage and brand equity has been hit. One thing is clear:...
Read Blog
January 30, 2018
9
Shares

Asset Management: Protecting your company’s most important assets

Asset Management: Protecting your company’s most important assets

Estimated reading time: 3 minutes

A comprehensive IT Asset Management (ITAM) program facilitates an accurate, documented IT environment covering the organization’s assets and data along with their owners and highlighting security and risks across the network. It helps to make critical decisions regarding software...
Read Blog
January 29, 2018
8
Shares

Cyber Vulnerability: Where do you stand?

Cyber Vulnerability: Where do you stand?

Estimated reading time: 2 minutes

Cyber-attacks have become household commonplaces, and the threats are increasing at an uncontrollable pace. According to threat reports released by leading security service providers, there has been a massive rise in the frequency of zero-day threats with vulnerabilities almost...
Read Blog
January 25, 2018

Become a leader in creating cyber trust with Seqrite Endpoint Security

Become a leader in creating cyber trust with Seqrite Endpoint Security

Estimated reading time: 3 minutes

Enterprises, big and small, all over the world, are waking up to the importance of garnering cyber trust. In a digital age where technology only breaches new frontiers, cyber trust has become a key differentiator. Security breaches are not...
Read Blog
January 24, 2018
17
Shares

What is the right time to audit your cybersecurity program?

What is the right time to audit your cybersecurity program?

Estimated reading time: 4 minutes

In November 2017, Forever 21, a Los Angeles based clothing retailer, announced that a potential data breach might have affected some of its customers. On investigating, they found that the “encryption and tokenization solution” implemented in 2015 might not...
Read Blog
January 23, 2018
14
Shares

Endpoint Security: Things to consider before choosing the right one

Endpoint Security: Things to consider before choosing the right one

Estimated reading time: 3 minutes

The term endpoint security refers to protecting endpoints such as desktops and laptops connected to the enterprise network. Endpoint security happens to be the front line in the battle against cyber-attacks because every device that connects to a corporate network...
Read Blog
January 18, 2018

What is Disaster Recovery as a Service (DRaaS)?

What is Disaster Recovery as a Service (DRaaS)?

Estimated reading time: 3 minutes

Disasters, whether they are natural or man-made, can strike anytime without any kind of due notice. Any business, small or big, will need to anticipate the possibility of such disasters and have a plan in place. While one tactic...
Read Blog
January 17, 2018
12
Shares
← Previous 1 … 27 28 29 … 43 Next →
Featured Authors
  • Seqrite
    Seqrite

    Seqrite is a leading enterprise cybersecurity solutions provider. With a focus...

    Read more..
  • Jyoti Karlekar
    Jyoti Karlekar

    I'm an avid writer who enjoys crafting content about emerging technologies and...

    Read more..
  • Bineesh P
    Bineesh P

    I am a passionate cybersecurity enthusiast and a dedicated writer. With a knack...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
Topics
apt (24) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (333) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (13) data protection (29) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (24) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (37) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (12) UTM (34) Vulnerability (16) zero trust (13)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies