• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Products Archive

Supercharge your security operations with end-to-end visibility, protection, and response using SEQRITE XDR

Supercharge your security operations with end-to-end visibility, protection, and response using SEQRITE XDR

Estimated reading time: 3 minutes

In today’s ever-evolving threat landscape, an organization’s security operations have never been more crucial. The complexity of remote work and multiple devices, apps, and tools has expanded the attack surface. Cybercriminals use advanced tactics, including AI-powered spear-phishing attacks on...
Read Blog
June 8, 2023

CVE-2019-11815: Experts discovered a privilege escalation vulnerability in the Linux Kernel

Estimated reading time: 2 minutes

Red Hat engineers and experts discovered a memory corruption vulnerability in Linux kernel, which is basically a flaw while implementation of RDS (Remote desktop Protocol) over TCP. This flaw has affected Red Hat, Ubuntu, Debian and SUSE and security...
Read Blog
May 27, 2019

What happens when you don’t patch your software?

What happens when you don’t patch your software?

Estimated reading time: 3 minutes

In May 2017, the entire world plunged into chaos. The WannaCry ransomware ravaged through close to 300,000 systems and 200,000 victims, shutting down networks, causing chaos and demanding payment to give data back. Just a month later, another cyber...
Read Blog
March 6, 2019
13
Shares

Seqrite mSuite – everything you need to know

Seqrite mSuite – everything you need to know

Estimated reading time: 3 minutes

Among the many tasks faced by top information security leaders at enterprises, mobile device management (MDM) is uppermost. Mobiles or cell phones are an everyday reality in this present day and age; the number of mobile phone users is...
Read Blog
March 4, 2019
13
Shares

Increase in threats to mobile devices

Increase in threats to mobile devices

Estimated reading time: 3 minutes

There’s an increasing threat to mobile devices all over the world and it’s not difficult to wonder why. The number of those small mini-computers we carry around in our pockets has literally just exploded – an estimate observed that...
Read Blog
February 14, 2019
9
Shares

Artificial Intelligence – its use and misuse

Artificial Intelligence – its use and misuse

Estimated reading time: 3 minutes

The term “artificial intelligence” always conjures images of a science-fiction prototype. Thanks to the influence of popular culture, artificial intelligence is always interpreted in the popular culture as intelligent machines and robots, autonomous, independent and able to take their...
Read Blog
February 4, 2019
17
Shares

Data Security Compliance for NBFCs

Data Security Compliance for NBFCs

Estimated reading time: 3 minutes

Non-bank financial institutions (NBFIs) or non-bank financial companies (NBFCs) have been an integral part of the Indian financial system. These are financial institutions that do not have a banking license or regulated by an agency but can still carry...
Read Blog
December 20, 2018
19
Shares

Which data should your company encrypt?

Which data should your company encrypt?

Estimated reading time: 3 minutes

As companies like Equifax, Target and Home Depot discovered to their chagrin, data breaches can be a long-drawn, costly, embarrassing affair.  The consequences can be disastrous – detailed, mostly negative media coverage, a loss of face in the eyes...
Read Blog
October 23, 2018
13
Shares

Impact of embracing MDM solutions for banking operations

Impact of embracing MDM solutions for banking operations

Estimated reading time: 3 minutes

The rise of mobile telephones has impacted the way corporations do business in all spheres and all over the world. The world of banking has not been an exception. A survey of US adults in 2018 found that mobile...
Read Blog
October 23, 2018
2
Shares

Management of mobile devices in the digital classroom with Seqrite MDM

Management of mobile devices in the digital classroom with Seqrite MDM

Estimated reading time: 3 minutes

In an earlier era, schools and educational institutions mostly frowned upon the mobile/cell phone. These items of portability were banned from campuses with students facing repercussions for possessing and using them within the institution. This was a time when...
Read Blog
October 16, 2018
1 2 … 5 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies