• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cloud Computing Archive

Cloud Security Under Siege: Fortify Your Defences Against Emerging Threats

Cloud Security Under Siege: Fortify Your Defences Against Emerging Threats

Estimated reading time: 3 minutes

Can the cloud be hacked? Yes, and when the cloud is hacked – it is not just data at risk! The emerging digital ecosystem is treacherous. Today, every company, whether large or small, is a reachable target with operations,...
Read Blog
September 5, 2023

Moving to the cloud? Learn how to manage your cyber risks on the journey to cloud transformation

Moving to the cloud? Learn how to manage your cyber risks on the journey to cloud transformation

Estimated reading time: 4 minutes

Cloud adoption has witnessed exponential growth over the past few years. However, it brings forth a new set of cyber risks that endanger organizations and their customers. In the best-case scenario, these unknown cyber risks may result in increased...
Read Blog
August 12, 2021

Proactiveness is the key to resolving hybrid cloud’s security challenges

Proactiveness is the key to resolving hybrid cloud’s security challenges

Estimated reading time: 2 minutes

The hybrid cloud model is fast becoming the environment of choice for enterprises. The reasons are simple: this model offers a seamless mix of convenience and security. Chief Information Officers appreciate the convenience of hybrid cloud models, offering organizations...
Read Blog
January 6, 2021

Are you making these common public cloud migration mistakes?

Are you making these common public cloud migration mistakes?

Estimated reading time: 2 minutes

Enterprises are increasingly migrating operations to the public cloud, enthused by the many benefits it offers. By embracing cloud competencies, enterprises can become leaner and faster, enabling their employees to access information and services from wherever they are. It...
Read Blog
October 9, 2020

The Evergreen ‘Make’ Utility: A cost-effective way of deployments on Cloud.

The Evergreen ‘Make’ Utility: A cost-effective way of deployments on Cloud.

Estimated reading time: 2 minutes

It might be difficult to find a software engineer who does not know ‘Make’ utility. ‘GNU Make’ is a tool which controls the generation of executables and other stuff related to the application code building. Capabilities of ‘Make’ are...
Read Blog
October 1, 2020

What to consider before investing in Cloud Security Competency?

What to consider before investing in Cloud Security Competency?

Estimated reading time: 2 minutes

American market research giant Forrester estimated in 2017 that the value of the public cloud market would reach at least $191 billion by 2020. This surge in the valuation is driven by the growing acceptance of cloud computing by...
Read Blog
October 18, 2019

Emerging Security Threats in Cloud Computing

Emerging Security Threats in Cloud Computing

Estimated reading time: 3 minutes

The worldwide cloud computing market is expected to grow to $191 billion by 2020. There are numerous advantages of cloud computing driving a move to the cloud; among them lower cost, faster time to market, and increased employee productivity. But what...
Read Blog
June 22, 2018
17
Shares
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies