• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

Why should enterprise directors get cybersecurity experts on board?

Why should enterprise directors get cybersecurity experts on board?

Estimated reading time: 2 minutes

The board of directors provide good governance and build a strategy for the enterprise. The successful running and well-being of a business often depend on the vision and direction provided by a competent board as they decide and execute...
Read Blog
November 21, 2019

Is a chief cybersecurity officer critical for the enterprise?

Is a chief cybersecurity officer critical for the enterprise?

Estimated reading time: 3 minutes

In 2015, the Government of India established a first of sorts – they created a chief cybersecurity officer position under the Prime Minister’s Office. Dr Gulshan Rai became the special secretary for cybersecurity and after serving four years in...
Read Blog
November 20, 2019

Information security is a business concern, not just an IT concern!

Information security is a business concern, not just an IT concern!

Estimated reading time: 2 minutes

The global research and advisory firm Gartner estimated that worldwide information security spending would exceed $124 billion in 2019. The reason for such spending in information security is justified when one looks at the consequences of ignoring the risk...
Read Blog
November 19, 2019

How can CISOs defend businesses from supply chain attacks?

How can CISOs defend businesses from supply chain attacks?

Estimated reading time: 3 minutes

A supply chain is an omnipresent and inseparable element in every business, irrespective of its size.  Hence, when it comes to cybersecurity specific to this aspect, simply protecting an enterprise’s periphery isn’t enough. Supply chains consist of people, logistics,...
Read Blog
November 18, 2019

How much did cyberattacks cost organizations in 2018?

How much did cyberattacks cost organizations in 2018?

Estimated reading time: 3 minutes

In today’s day, it has become common knowledge that cyberattacks are dangerous for an organization. However, sometimes, people within the organization can differ on the exact impact of these threats. These differences can often blindside businesses on the total...
Read Blog
November 13, 2019

The past, present and future of cybersecurity

The past, present and future of cybersecurity

Estimated reading time: 3 minutes

The evolution of cybersecurity is both, fascinating and intriguing. Today’s cybersecurity professionals have immense responsibility and burden compared to yesteryears – they have to tackle with a wide range of cyberthreats such as malware, insider attacks & Distributed Denial...
Read Blog
November 12, 2019

The cybersecurity threats drones face and how to mitigate them

The cybersecurity threats drones face and how to mitigate them

Estimated reading time: 3 minutes

The global drone market is expected to rise to $43 billion in 2024, a huge rise from $14 billion in 2018. It is an indicator of the huge popularity surge in drones, technically known as unmanned aerial vehicles (UAVs)....
Read Blog
November 7, 2019

The Seqrite Arsenal: Understanding how our solutions protect every aspect of the enterprise

The Seqrite Arsenal: Understanding how our solutions protect every aspect of the enterprise

Estimated reading time: 3 minutes

Seqrite is the enterprise security brand from Quick Heal, a leading IT security solutions company with over 25 years of experience in computer and network security solutions. Backed by Quick Heal’s cutting-edge expertise of producing cybersecurity solutions for more...
Read Blog
November 5, 2019

The seven key trends that define how cybersecurity is changing

The seven key trends that define how cybersecurity is changing

Estimated reading time: 3 minutes

Rounding up our content for the summit that just went by, it is evident that as the world enters a new decade, there will be a paradigm shift in cybersecurity. This shift is likely to be driven by a...
Read Blog
November 4, 2019

The benefits of an AI-based approach towards cyber protection

The benefits of an AI-based approach towards cyber protection

Estimated reading time: 2 minutes

The usage of artificial intelligence (AI) promises to be a game-changer for cybersecurity. The threat of cyber attacks and their consequences continue to loom large – in India, a report found that 37% of companies experienced a downtime of...
Read Blog
October 23, 2019
← Previous 1 … 10 11 12 … 32 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (34) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies