• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Network Security Archive

Healthcare on High Alert: The Alarming Rise of Cyberattacks on eInfra Sends Shockwaves Through the Industry – Are You Safe?

Healthcare on High Alert: The Alarming Rise of Cyberattacks on eInfra Sends Shockwaves Through the Industry – Are You Safe?

Estimated reading time: 3 minutes

The world of healthcare is rapidly changing. Technological advancements expose organizations to cyber risks, including ransomware, malware, breaches, viruses, and vulnerabilities. The combination of poor cybersecurity practices, digital transformation in care delivery, operational touchpoints, and sensitive data storage makes...
Read Blog
April 11, 2023

Spring4Shell: Zero-Day vulnerability CVE-2022-22965 in Spring Framework

Spring4Shell: Zero-Day vulnerability CVE-2022-22965 in Spring Framework

Estimated reading time: 2 minutes

A Zero-day Remote Code Execution Vulnerability with critical severity has been identified as CVE-2022-22965 aka Spring4Shell or SpringShell in Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19 & older. The Spring Framework is an open-source, popular, feature-rich application...
Read Blog
April 6, 2022

Legacy Systems longing for enterprise attention?

Legacy Systems longing for enterprise attention?

Estimated reading time: 3 minutes

Legacy systems such as mainframes may be considered outdated by today’s standards but they continue to play major roles in many sectors, primarily finance, government, retail, healthcare and insurance. In these industries, they are crucial parts of day-to-day operations,...
Read Blog
August 6, 2020

What is SASE and how does it reinforce network security?

What is SASE and how does it reinforce network security?

Estimated reading time: 2 minutes

Secure Access Service Edge (SASE, commonly pronounced as “sassy”) is an emerging new cybersecurity concept that was coined by global research leaders Gartner in 2019. It refers to a new offering that simplifies Wide Area Networking (WAN) and enterprise...
Read Blog
May 13, 2020

What are the different techniques of intruding networks?

What are the different techniques of intruding networks?

Estimated reading time: 2 minutes

Network performance is the key indicator of an enterprise’s productivity and health in these connected times. It is the prerequisite of every business enterprise to maintain a smooth network workflow; however, that is easier said than done. Enterprise networks...
Read Blog
December 19, 2019

Effective methods for enterprises to detect and prevent network intrusions

Effective methods for enterprises to detect and prevent network intrusions

Estimated reading time: 2 minutes

Enterprise networks are susceptible to brutal intrusions – some of these intrusions could be in the form of systems on the network running unauthorized applications with vulnerabilities and backdoors. When such vulnerabilities are exploited, unsolicited access to the network...
Read Blog
October 4, 2019

SSH In Nutshell : A protocol for secured network communication

SSH In Nutshell : A protocol for secured network communication

Estimated reading time: 4 minutes

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. A widely used Transport Layer Protocol, SSH is used to secure connections between clients and servers. SSH was basically designed as a...
Read Blog
August 12, 2019

Don’t put the network visibility of your enterprise at risk

Don’t put the network visibility of your enterprise at risk

Estimated reading time: 3 minutes

We live in a connected world – thanks to the rise of new trends and concepts like Internet of Things (IoT) or Bring Your Own Device (BYOD), enterprise networks can’t restrict themselves to a specific set of predefined devices....
Read Blog
July 30, 2019

How to build a strong cloud network security strategy

How to build a strong cloud network security strategy

Estimated reading time: 2 minutes

While enterprises often focus on building strong, robust cybersecurity interfaces for their in-house networks, cybersecurity for cloud networks is a whole different ballgame. Yet, enterprises cannot avoid the advantages of doing their business on the cloud – the sheer...
Read Blog
June 10, 2019

How to protect your server against ransomware attacks?

How to protect your server against ransomware attacks?

Estimated reading time: 3 minutes

There is one big reason why ransomware has suddenly become the hot new topic in cybersecurity: its ease of use. The proponents of ransomware have realized that it provides an easy, anonymous way to terrorize corporates and get easy...
Read Blog
May 16, 2018
1 2 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (22) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies