• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

Top 5 most wanted cybercriminals across the globe

Top 5 most wanted cybercriminals across the globe

Estimated reading time: 3 minutes

Cyber-crime is being widely discussed as a critical topic holding global relevance. In the professional discourse, it is essential that businesses, government-specific entities, and even citizens are vigilant enough when it comes to avoiding the potential threats. This also...
Read Blog
November 13, 2017

Answers to Your Top Cybersecurity Questions

Answers to Your Top Cybersecurity Questions

Estimated reading time: 3 minutes

Introduction Cybersecurity threats are incessantly eating into the organizational data reserves, and it is important that CISOs and IT Security Pros keep a close check on the proliferation of hackers and cyber-criminals. While the overall awareness towards cybersecurity is...
Read Blog
October 27, 2017

Strategies to mitigate risks of false positives in cybersecurity

Strategies to mitigate risks of false positives in cybersecurity

Estimated reading time: 3 minutes

Businesses facing a barrage of security risks daily rely heavily on detection technologies to assess and work alongside the existing threat landscape. However, keeping up with the same can still be a daunting task with the existence of false...
Read Blog
October 18, 2017

Hacking requires exceptional skills: How can IT security pros stay ahead of the hackers?

Hacking requires exceptional skills: How can IT security pros stay ahead of the hackers?

Estimated reading time: 3 minutes

While security professionals keep developing better software programs, hackers simultaneously devise strategies for combating the upgraded defense. Therefore, in order to analyze the importance of cybersecurity while staying one step ahead of these hackers, the security professionals need to...
Read Blog
October 16, 2017

Central Bank of Kenya mandates robust cybersecurity across banks in Kenya by 30th Nov, 2017

Central Bank of Kenya mandates robust cybersecurity across banks in Kenya by 30th Nov, 2017

Estimated reading time: 5 minutes

The Central Bank of Kenya (CBK) recently issued a guideline to all commercials banks across Kenya to fortify their cybersecurity and establish effective cybersecurity governance and risk management. The CBK acknowledged the growing risk of cyber threats and highlighted...
Read Blog
October 11, 2017

Hackers Surveillance: How cybercriminals use hacker surveillance to target your business?

Hackers Surveillance: How cybercriminals use hacker surveillance to target your business?

Estimated reading time: 3 minutes

Data breaches and cyber-attacks are common occurrences which usually proliferate at an exponential rate. While it is important that enterprises tighten their enclosures, it is also advisable to understand how cybercriminals prepare for a breach. Hacker surveillance is one way...
Read Blog
October 9, 2017

Cybersecurity: New threats taking off in the Aviation Industry

Cybersecurity: New threats taking off in the Aviation Industry

Estimated reading time: 3 minutes

The airline business is unique. While public perception about aviation is that of a luxury business; the business world sees it as a financial behemoth reeling under debt burdens. Only people from the aviation industry and a few from the security industry understand that...
Read Blog
October 5, 2017

Attacks on SSL are on the rise: Know more who is hiding in your encrypted traffic.

Attacks on SSL are on the rise: Know more who is hiding in your encrypted traffic.

Estimated reading time: 3 minutes

Most of the organizations have already moved on to SSL (Secure Sockets Layer) to protect their data in motion. We like to believe that once SSL protocol is implemented our data is safe from the hackers. However, the hackers too have learned to take...
Read Blog
October 2, 2017

Cybersecurity and cyber intelligence for a machine determined future

Cybersecurity and cyber intelligence for a machine determined future

Estimated reading time: 3 minutes

With the world moving towards a machine determined future, somewhere deep within, it does bother many of us when we think about the power we intend to leave in the hands of machines. Honestly, some of us are worried...
Read Blog
September 25, 2017

Cybersecurity trends and predictions to watch out for in 2017

Cybersecurity trends and predictions to watch out for in 2017

Estimated reading time: 3 minutes

If 2016 was the year of data breaches, 2017 might just well take things to a whole new level; precisely when it comes to cybersecurity threats. Hackers have newer tools in their arsenal which have multiplied difficulties for organizations—...
Read Blog
September 14, 2017
← Previous 1 … 12 13 14 … 16 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies