• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Endpoint Security Archive

Multi-layered approach is the key towards cybersecurity

Multi-layered approach is the key towards cybersecurity

Estimated reading time: 3 minutes

With the cybersecurity threat-landscape evolving with each passing day, it becomes important that organizations opt for newer and safer strategies for staying functional without worrying about cyber-threats. Moreover, organizations must readily focus on cybersecurity while keeping a track of...
Read Blog
January 9, 2018
5
Shares

What are the major ingredients of cybersecurity in 2018?

What are the major ingredients of cybersecurity in 2018?

Estimated reading time: 3 minutes

2017 was a highly eventful year for cybersecurity experts as they incessantly kept combating the proliferating security incidents with considerable success. While a few incidents grabbed the headlines, a majority of cyber-attacks went unannounced. Now in 2018, it seems...
Read Blog
January 4, 2018
3
Shares

2018: What’s your New Year resolution for cybersecurity?

2018: What’s your New Year resolution for cybersecurity?

Estimated reading time: 3 minutes

Reports released by CSO suggest that cybersecurity threats are expected to amplify up to a staggering $6 trillion, by the end of 2021. This revelation validates the fact that security threats are looming large and majority of global businesses...
Read Blog
January 2, 2018

Cybersecurity News Rundown December 2017

Cybersecurity News Rundown December 2017

Estimated reading time: 2 minutes

Welcome to our Cybersecurity News Rundown for the month of December 2017. Here, we will be sharing latest and trending news on events and technological updates from the world of cybersecurity that happened over the past month. Make sure...
Read Blog
December 31, 2017
6
Shares

Lessons security professionals should learn from the year 2017

Lessons security professionals should learn from the year 2017

Estimated reading time: 4 minutes

2017 has been a year of several high-profile cyber-attacks with an excruciatingly large number of breaches originating from third-party software modules and compromised accounts. With hackers constantly trying to gain access to confidential data sets, it is important to...
Read Blog
December 20, 2017

Seqrite Endpoint Security Enterprise Suite receives BEST+++ certification from AVLab in Fileless Malware Protection Test

Seqrite Endpoint Security Enterprise Suite receives BEST+++ certification from AVLab in Fileless Malware Protection Test

Estimated reading time: 2 minutes

AVLab is an independent organization that conducts tests on security software for corporate networks and individual user devices. These tests are conducted by using malicious software, tools, and bypassing security techniques that are used in real cyberattacks. In October...
Read Blog
December 7, 2017
1
Share

Effective Patch Management requires a well-defined strategy

Effective Patch Management requires a well-defined strategy

Estimated reading time: 3 minutes

Patch Management holds a lot of relevance in an organization’s cybersecurity plan. Most hackers are on a continuous look out for system vulnerabilities to barge into IT network. This in turn offers them an opportunity to steal intellectual property...
Read Blog
November 23, 2017

Why should companies invest in evolving cybersecurity technology?

Why should companies invest in evolving cybersecurity technology?

Estimated reading time: 3 minutes

With the cyber-threat landscape evolving with time, we are continually witnessing newer strains of malware attacking IT security networks. Needless to say, organizations are losing their ground, and it’s time they address the issues at hand by innovating the...
Read Blog
November 16, 2017

Remember the security basics as your cybersecurity strategy evolves

Remember the security basics as your cybersecurity strategy evolves

Estimated reading time: 3 minutes

Most cybersecurity strategies thrive on advanced technologies when it comes to mitigating complex threats. In the meanwhile, CISOs and the concerned IT heads tend to ignore the basic precautions and security standards required for preventing data breaches. Although technological...
Read Blog
November 15, 2017

Vulnerabilities are unavoidable: Here are the top 5 commandments of Vulnerability Scan

Vulnerabilities are unavoidable: Here are the top 5 commandments of Vulnerability Scan

Estimated reading time: 3 minutes

Organizations using software modules are more likely to get affected by intruders and unsolicited access. Moreover, if the software is popular, there are additional chances that the connected services and written codes might attract hackers and malicious parties. Security...
Read Blog
November 14, 2017
← Previous 1 … 6 7 8 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies