• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Viraj Talikotkar

About Viraj Talikotkar

Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on the lookout to discover and write about the latest innovations that safeguard enterprise data from cyber threats. He is a pseudo-intellectual, feline worshipper and biker in his free time.

AV-Test certifies Seqrite EPS as the top product for Windows, yet again!

AV-Test certifies Seqrite EPS as the top product for Windows, yet again!

Estimated reading time: 2 minutes

We are happy to announce that Seqrite’s Endpoint Security has yet again been tested and certified by the prestigious AV-Test Org as the best security product for Windows. The latter ran extensive tests on the existing capabilities of EPS...
Read Blog
August 7, 2020

EMM stakeholders warned to watch out for sophisticated Cerebrus spyware

EMM stakeholders warned to watch out for sophisticated Cerebrus spyware

Estimated reading time: 3 minutes

A new variant of the Cerebrus Android Trojan has been discovered with dangerous spyware capabilities. Enterprise Mobility Management (EMM) stakeholders are warned to remain vigilant and prevent being exploited by this Trojan. Cerebrus was detected last year and was...
Read Blog
May 25, 2020

Is the Coronavirus also indirectly endangering your enterprise data?

Is the Coronavirus also indirectly endangering your enterprise data?

Estimated reading time: 5 minutes

The threat is real! The WHO has recently announced that the Coronavirus catastrophe has reached a a pandemic level. Amidst the global chaos, enterprises are in helter-skelter as well, thinking of the best possible ways to retain business continuity...
Read Blog
March 26, 2020

Quick Heal Technologies pledges to safeguard their enterprise customers in the testing times of the Novel Coronavirus

Quick Heal Technologies pledges to safeguard their enterprise customers in the testing times of the Novel Coronavirus

Estimated reading time: 2 minutes

As the novel Coronavirus continues to aggravate throughout the globe, we thought of taking the time out to diligently write to our customers and channel partners that our capabilities to protect you have stayed intact. The majority of our...
Read Blog
March 20, 2020

Anti-Ransomware software is not a data backup solution!

Anti-Ransomware software is not a data backup solution!

Estimated reading time: 2 minutes

Over 30,000 customers across the globe rely on Seqrite’s cutting-edge Anti-Ransomware capabilities to protect businesses from being taken as hostages by hackers. Quick Heal, the parent company of enterprise cybersecurity brand Seqrite, had predicted ransomware to be the menace...
Read Blog
December 13, 2019

Pegasus like spyware could be snooping on you right now!!

Pegasus like spyware could be snooping on you right now!!

Estimated reading time: 4 minutes

The recent news of Pegasus spyware attack via WhatsApp that targeted lawyers, journalists and human rights activists, offers an astonishing revelation on the kind of havoc such spyware can create. We covered the topic extensively, recently. The frequent media...
Read Blog
November 22, 2019

Cybersecurity to be the biggest threat to the enterprise for the next decade

Cybersecurity to be the biggest threat to the enterprise for the next decade

Estimated reading time: 3 minutes

Ernst & Young (EY) conducted a CEO imperative survey and gathered exclusive insights from 200 global CEOs and some of Forbes’ largest private players about what they thought will be the biggest problem for businesses in the coming years?...
Read Blog
September 5, 2019

Essential practices to strengthen your business’ cybersecurity

Essential practices to strengthen your business’ cybersecurity

Estimated reading time: 4 minutes

With enterprises being the centre of attention of an ever-evolving threat landscape, foolproof security of business assets has become the need of the hour. To counter the menace of cyberattacks, today we have businesses that specialize in the development...
Read Blog
August 16, 2019

How important is it to understand enterprise security management?

How important is it to understand enterprise security management?

Estimated reading time: 3 minutes

Businesses increasingly face a wide array of ever-changing cyber risks as they adapt to the technologies and trends of today’s work environment. The world is in the throes of a digital revolution which has constituted a wide array of...
Read Blog
August 13, 2019

Hackers are breaking into the enterprise through content collaboration platforms CCPs

Hackers are breaking into the enterprise through content collaboration platforms CCPs

Estimated reading time: 4 minutes

Globally, as enterprises gather and integrate optimum avenues to secure their information technology infrastructure from cyber threats, somehow, hackers are still managing to find a way to break-in. Cybersecurity vigilance has driven business stakeholders to secure core networks with...
Read Blog
July 17, 2019
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies