• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

Quick Heal Technologies pledges to safeguard their enterprise customers in the testing times of the Novel Coronavirus

Quick Heal Technologies pledges to safeguard their enterprise customers in the testing times of the Novel Coronavirus

Estimated reading time: 2 minutes

As the novel Coronavirus continues to aggravate throughout the globe, we thought of taking the time out to diligently write to our customers and channel partners that our capabilities to protect you have stayed intact. The majority of our...
Read Blog
March 20, 2020

Managing cybersecurity in multimedia networks

Managing cybersecurity in multimedia networks

Estimated reading time: 2 minutes

The explosion of internet speeds across the globe has led to a rapid increase in high-end streaming technology, wireless sensor networks and wearable Internet of Things (IoT) devices. Multimedia networks generate huge amounts of data flowing through multiple devices...
Read Blog
December 30, 2019

Black Hat Hackers & White Hat Hackers – The Sequel

Black Hat Hackers & White Hat Hackers – The Sequel

Estimated reading time: 2 minutes

Thanks to popular culture, the image of a hacker has often become stereotypical, which is ‘criminals using advanced cyber techniques to infiltrate enterprises or systems, with the intention to cause mayhem.’ It’s an image carefully cultivated by movies and...
Read Blog
December 25, 2019

How do Intrusion Detection/Prevention Systems work?

How do Intrusion Detection/Prevention Systems work?

Estimated reading time: 3 minutes

Enterprises mainly use two types of systems to deal with network intrusions – Intrusion Detection System (IDS) and Intrusion Prevention System (IPS). While the two systems are primarily similar, it is important to understand the major aspects which distinguish...
Read Blog
December 23, 2019

What is Network Forensics and how does it help cybersecurity professionals?

What is Network Forensics and how does it help cybersecurity professionals?

Estimated reading time: 2 minutes

Network forensics refers to a branch of digital forensics, chiefly involved with the collection and analysis of network traffic for the purpose of understanding evidence about cybercrimes for preventing it. A report from the European Union Agency for Cybersecurity...
Read Blog
December 17, 2019

Enterprise security in the age of nation-state cybersecurity threats

Enterprise security in the age of nation-state cybersecurity threats

Estimated reading time: 2 minutes

The digital modern battlefield has proven time-and-again that cyberattacks, just like tanks and guns, are one of the biggest weapons that a country possesses to wage a war. All over the world, nation-states are surreptitiously or, in some cases,...
Read Blog
December 12, 2019

The burning issue of building a cybersecurity framework

The burning issue of building a cybersecurity framework

Estimated reading time: 2 minutes

Strategic planning and performance reviews have always been an important component for the c-suite and members of the board. Adding on to their responsibilities, now, cybersecurity has also become an essential part of the conversation that enterprise stakeholders have,...
Read Blog
December 3, 2019

Crucial aspects CISOs should look at while building a businesses’ cybersecurity roadmap

Crucial aspects CISOs should look at while building a businesses’ cybersecurity roadmap

Estimated reading time: 3 minutes

Cybersecurity has had a heightened impact in 2019, made visible by the growing responsibilities of the Chief Information Security Officer (CISO). A decade back, cybersecurity was a function looked at by Chief Information Officers and IT teams. However, cybersecurity...
Read Blog
November 27, 2019

Why should enterprise directors get cybersecurity experts on board?

Why should enterprise directors get cybersecurity experts on board?

Estimated reading time: 2 minutes

The board of directors provide good governance and build a strategy for the enterprise. The successful running and well-being of a business often depend on the vision and direction provided by a competent board as they decide and execute...
Read Blog
November 21, 2019

Is a chief cybersecurity officer critical for the enterprise?

Is a chief cybersecurity officer critical for the enterprise?

Estimated reading time: 3 minutes

In 2015, the Government of India established a first of sorts – they created a chief cybersecurity officer position under the Prime Minister’s Office. Dr Gulshan Rai became the special secretary for cybersecurity and after serving four years in...
Read Blog
November 20, 2019
← Previous 1 … 4 5 6 … 16 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies