• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

Cybersecurity News Rundown October 2017

Cybersecurity News Rundown October 2017

Estimated reading time: 2 minutes

Welcome to our Cybersecurity News Rundown for the month of October 2017. Here, we will be sharing latest and trending news on events and technological updates from the world of cybersecurity that happened over the past month. Make sure...
Read Blog
October 31, 2017

Answers to Your Top Cybersecurity Questions

Answers to Your Top Cybersecurity Questions

Estimated reading time: 3 minutes

Introduction Cybersecurity threats are incessantly eating into the organizational data reserves, and it is important that CISOs and IT Security Pros keep a close check on the proliferation of hackers and cyber-criminals. While the overall awareness towards cybersecurity is...
Read Blog
October 27, 2017

5 Reasons why startups need to boost their cyber-resilience

5 Reasons why startups need to boost their cyber-resilience

Estimated reading time: 3 minutes

Be it a board member or CXO, every individual associated with the cybersecurity business must be well versed with cyber-resilience.  Quite often, we see this term surfacing in the news, social feeds and even general conversations, making this discussion...
Read Blog
October 26, 2017

Major security issues that keep your organization’s CISO up all night

Major security issues that keep your organization’s CISO up all night

Estimated reading time: 3 minutes

With multiple ransomware attacks making the headlines, it is essential that the IT heads and concerned CISOs start treating cybersecurity as a mainstream topic. However, it is saddening to see that the sophisticated threats are continually outpacing the growth...
Read Blog
October 25, 2017

Another Ransomware Outbreak! This time it’s Bad Rabbit

Another Ransomware Outbreak! This time it’s Bad Rabbit

Estimated reading time: 3 minutes

The recent Bad Rabbit ransomware outbreak is currently making headlines. This post outlines the analysis of the ransomware by Quick Heal Security Labs. According to our telemetry, we have not seen any Bad Rabbit ransomware infection on our customer’s...
Read Blog
October 25, 2017

Protect your files or pay ransom: What will you choose?

Protect your files or pay ransom: What will you choose?

Estimated reading time: 3 minutes

Believe it or not, traditional cyber-criminals are slowly abandoning the obsolete techniques of making money-courtesy the growing popularity of ransomware attacks. The latter is a lucrative crime operation which plagues every business, regardless of its spread. Cyber extortionists keep...
Read Blog
October 24, 2017

Why we need to focus on protecting enterprise devices?

Why we need to focus on protecting enterprise devices?

Estimated reading time: 3 minutes

Mobility is a widely-adopted approach that comes as a blessing for organizational growth but builds up as a headache for the IT security pros. While mobility can help enterprises reduce service costs and improve user experience by concentrating more...
Read Blog
October 23, 2017

Spotted a breach? Know more about the after-effects of a security incident

Spotted a breach? Know more about the after-effects of a security incident

Estimated reading time: 3 minutes

Data breaches have now become a common occurrence but with myriad legislations in place— including the likes of GDPR— stakes for the enterprises are at an all-time high. When it comes to handling a breach, companies depend on the...
Read Blog
October 20, 2017

What is a Business Email Compromise (BEC) attack? How Seqrite can help in protecting your business email?

What is a Business Email Compromise (BEC) attack? How Seqrite can help in protecting your business email?

Estimated reading time: 3 minutes

A few months back, FBI released a report stating that Business Email Compromise or rather BEC scams usually cost businesses around  $3.1 billion. In addition to that, FBI also warned organizations regarding “Man-in-the-Email” and “CEO Fraud”; some of the...
Read Blog
October 19, 2017

Strategies to mitigate risks of false positives in cybersecurity

Strategies to mitigate risks of false positives in cybersecurity

Estimated reading time: 3 minutes

Businesses facing a barrage of security risks daily rely heavily on detection technologies to assess and work alongside the existing threat landscape. However, keeping up with the same can still be a daunting task with the existence of false...
Read Blog
October 18, 2017
← Previous 1 … 32 33 34 … 42 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies