• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

How fraudulent SSL certificates could be utilized to hack your website?

How fraudulent SSL certificates could be utilized to hack your website?

Estimated reading time: 3 minutes

When it comes to validating the identity of any public key infrastructure, digital certificates hold all the aces. A digital certificate is more of an electronic snippet that lends legitimacy to a web service or portal— associating the same...
Read Blog
October 11, 2017

Cybercriminals know the importance of your data. Do you?

Cybercriminals know the importance of your data. Do you?

Estimated reading time: 3 minutes

Educating oneself when it comes to cybersecurity is extremely important and should always be stressed upon. A better understanding of this subject increases the chances of staying safe from the existing threats. More often than not, the importance of...
Read Blog
October 10, 2017

Hackers Surveillance: How cybercriminals use hacker surveillance to target your business?

Hackers Surveillance: How cybercriminals use hacker surveillance to target your business?

Estimated reading time: 3 minutes

Data breaches and cyber-attacks are common occurrences which usually proliferate at an exponential rate. While it is important that enterprises tighten their enclosures, it is also advisable to understand how cybercriminals prepare for a breach. Hacker surveillance is one way...
Read Blog
October 9, 2017

Strengthen your Enterprise Security with Seqrite EPS

Strengthen your Enterprise Security with Seqrite EPS

Estimated reading time: 3 minutes

With the increase in mobility of users, their usage and the access to the organization’s information assets extending to off-campus locations, the security perimeter keeps continuously changing.  This has led to a situation that a simple security solution within...
Read Blog
October 6, 2017

Cybersecurity: New threats taking off in the Aviation Industry

Cybersecurity: New threats taking off in the Aviation Industry

Estimated reading time: 3 minutes

The airline business is unique. While public perception about aviation is that of a luxury business; the business world sees it as a financial behemoth reeling under debt burdens. Only people from the aviation industry and a few from the security industry understand that...
Read Blog
October 5, 2017

Attacks on SSL are on the rise: Know more who is hiding in your encrypted traffic.

Attacks on SSL are on the rise: Know more who is hiding in your encrypted traffic.

Estimated reading time: 3 minutes

Most of the organizations have already moved on to SSL (Secure Sockets Layer) to protect their data in motion. We like to believe that once SSL protocol is implemented our data is safe from the hackers. However, the hackers too have learned to take...
Read Blog
October 2, 2017

Cybersecurity News Rundown September 2017

Cybersecurity News Rundown September 2017

Estimated reading time: 3 minutes

Welcome to our Cybersecurity News Rundown for the month of September 2017. Here, we will be sharing latest and trending news on events and technological updates from the world of cybersecurity that happened over the past month. Make sure...
Read Blog
September 30, 2017

Gateway protection: Next-Gen security solution

Gateway protection: Next-Gen security solution

Estimated reading time: 3 minutes

Cyberworld has become a jungle full of dangerous beasts. There are so many threats out there that it requires a large and dedicated set of professionals with state of the art equipment to protect the organization against all of...
Read Blog
September 29, 2017

Encryption: Improve information security by turning it into codes

Encryption: Improve information security by turning it into codes

Estimated reading time: 3 minutes

Today the economy is all about data. All  the business financial information, customer information, Intellectual property information, and all other information about the business is stored in digital format. All this information is data. In a pre-digital era, the data was in physical...
Read Blog
September 28, 2017

What are software and zero-day vulnerabilities?

What are software and zero-day vulnerabilities?

Estimated reading time: 3 minutes

Software developers ensure that there are no security gaps when they release a new version of their software, be it an application or an operating system or any other kind of software. However, it is impossible to design a...
Read Blog
September 27, 2017
← Previous 1 … 34 35 36 … 42 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (332) cyber security (34) Cyber threat (33) cyber threats (49) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (12) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) mobile device management (11) Network security (23) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (37) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) zero trust (12)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies