• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

Are you making these common public cloud migration mistakes?

Are you making these common public cloud migration mistakes?

Estimated reading time: 2 minutes

Enterprises are increasingly migrating operations to the public cloud, enthused by the many benefits it offers. By embracing cloud competencies, enterprises can become leaner and faster, enabling their employees to access information and services from wherever they are. It...
Read Blog
October 9, 2020

Could you be blindsided when your CEO emails you?

Could you be blindsided when your CEO emails you?

Estimated reading time: 2 minutes

Whaling attacks are a deadly combination of spear-phishing and social engineering. Like phishing attacks, the attempts of the perpetrators are similar – to get a target to reveal confidential data or even get tricked and send money. But whaling...
Read Blog
September 22, 2020

Deploy a layered security model through Seqrite!

Deploy a layered security model through Seqrite!

Estimated reading time: 2 minutes

To understand the concept of layered security, it’s important to remember a key tenet of cybersecurity – no security solution is infallible. As security experts state, it’s not a question of how, but when. Cybercrooks are evolving everyday to...
Read Blog
September 17, 2020

Did you know that adversaries are planning to steal your data?

Did you know that adversaries are planning to steal your data?

Estimated reading time: 2 minutes

How valuable is data? A good way to answer that question is to look at the average cost of a data breach. Recent research in May 2020 found that the average cost of a data breach was USD 3.92...
Read Blog
September 11, 2020

Ruthless Valak snowballs into an enterprise’s worst nightmare.

Ruthless Valak snowballs into an enterprise’s worst nightmare.

Estimated reading time: 2 minutes

A new and deadlier version of a familiar malware —it was discovered in 2019 and designated a sophisticated piece of malware, Valak was considered a type of malware loader, a type of program used to load other malware on...
Read Blog
September 9, 2020

Cybersecurity below the kernel

Cybersecurity below the kernel

Estimated reading time: 2 minutes

Security of a computing endpoint is traditionally viewed with respect to Firewall, HIPS, AV Products, etc. This perspective though misses out on “Below Kernel” aspects of cyber threats, which may target Hypervisor, Firmware or Hardware itself. Here are some...
Read Blog
August 27, 2020

PonyFinal Ransomware dubbed by many as the modern-day Trojan horse.

PonyFinal Ransomware dubbed by many as the modern-day Trojan horse.

Estimated reading time: 2 minutes

Microsoft recently warned its over 100,000 followers about the emergence of a new human-operated Java-based ransomware that has been involved in targeted attacks in the US, India and Iran. PonyFinal, the name of this malware, is an example of...
Read Blog
August 26, 2020

Legacy Systems longing for enterprise attention?

Legacy Systems longing for enterprise attention?

Estimated reading time: 3 minutes

Legacy systems such as mainframes may be considered outdated by today’s standards but they continue to play major roles in many sectors, primarily finance, government, retail, healthcare and insurance. In these industries, they are crucial parts of day-to-day operations,...
Read Blog
August 6, 2020

Is your router exposed to cyber threats? Here is how to safeguard it.

Is your router exposed to cyber threats? Here is how to safeguard it.

Estimated reading time: 4 minutes

Routers are extremely vulnerable to cyberattacks. Here’s how to safeguard them Given that a large number of people use a router to connect to web, chances are that may be you using a router at home to access the...
Read Blog
July 30, 2020

Are industrial whales getting massacred by spear-phishing?

Are industrial whales getting massacred by spear-phishing?

Estimated reading time: 2 minutes

Supply chains and industrial enterprises are being targeted through a series of ongoing spear-phishing attacks. This recent campaign, observed on systems within Germany, United States and Japan thus far, operates through the obfuscation of malware on public, legitimate sources....
Read Blog
July 28, 2020
← Previous 1 … 6 7 8 … 42 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (332) cyber security (34) Cyber threat (33) cyber threats (49) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (12) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) mobile device management (11) Network security (23) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (37) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) zero trust (12)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies