• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Products Archive

CVE-2019-11815: Experts discovered a privilege escalation vulnerability in the Linux Kernel

Estimated reading time: 2 minutes

Red Hat engineers and experts discovered a memory corruption vulnerability in Linux kernel, which is basically a flaw while implementation of RDS (Remote desktop Protocol) over TCP. This flaw has affected Red Hat, Ubuntu, Debian and SUSE and security...
Read More
May 27, 2019

What happens when you don’t patch your software?

What happens when you don’t patch your software?

Estimated reading time: 3 minutes

In May 2017, the entire world plunged into chaos. The WannaCry ransomware ravaged through close to 300,000 systems and 200,000 victims, shutting down networks, causing chaos and demanding payment to give data back. Just a month later, another cyber...
Read More
March 6, 2019
  • 13
    Shares

Seqrite mSuite – everything you need to know

Seqrite mSuite – everything you need to know

Estimated reading time: 3 minutes

Among the many tasks faced by top information security leaders at enterprises, mobile device management (MDM) is uppermost. Mobiles or cell phones are an everyday reality in this present day and age; the number of mobile phone users is...
Read More
March 4, 2019
  • 13
    Shares

Increase in threats to mobile devices

Increase in threats to mobile devices

Estimated reading time: 3 minutes

There’s an increasing threat to mobile devices all over the world and it’s not difficult to wonder why. The number of those small mini-computers we carry around in our pockets has literally just exploded – an estimate observed that...
Read More
February 14, 2019
  • 9
    Shares

Artificial Intelligence – its use and misuse

Artificial Intelligence – its use and misuse

Estimated reading time: 3 minutes

The term “artificial intelligence” always conjures images of a science-fiction prototype. Thanks to the influence of popular culture, artificial intelligence is always interpreted in the popular culture as intelligent machines and robots, autonomous, independent and able to take their...
Read More
February 4, 2019
  • 17
    Shares

Data Security Compliance for NBFCs

Data Security Compliance for NBFCs

Estimated reading time: 3 minutes

Non-bank financial institutions (NBFIs) or non-bank financial companies (NBFCs) have been an integral part of the Indian financial system. These are financial institutions that do not have a banking license or regulated by an agency but can still carry...
Read More
December 20, 2018
  • 19
    Shares

Which data should your company encrypt?

Which data should your company encrypt?

Estimated reading time: 3 minutes

As companies like Equifax, Target and Home Depot discovered to their chagrin, data breaches can be a long-drawn, costly, embarrassing affair.  The consequences can be disastrous – detailed, mostly negative media coverage, a loss of face in the eyes...
Read More
October 23, 2018
  • 13
    Shares

Impact of embracing MDM solutions for banking operations

Impact of embracing MDM solutions for banking operations

Estimated reading time: 3 minutes

The rise of mobile telephones has impacted the way corporations do business in all spheres and all over the world. The world of banking has not been an exception. A survey of US adults in 2018 found that mobile...
Read More
October 23, 2018
  • 2
    Shares

Management of mobile devices in the digital classroom with Seqrite MDM

Management of mobile devices in the digital classroom with Seqrite MDM

Estimated reading time: 3 minutes

In an earlier era, schools and educational institutions mostly frowned upon the mobile/cell phone. These items of portability were banned from campuses with students facing repercussions for possessing and using them within the institution. This was a time when...
Read More
October 16, 2018

Encryption solution for educational institutes

Encryption solution for educational institutes

Estimated reading time: 3 minutes

When the discussion veers around topics like data security and breach, what are the kinds of organizations which, you think, are most likely at risk? The first answer that comes to your minds might be banks or big multinational...
Read More
October 11, 2018
  • 11
    Shares
1 2 … 5 Next →
Popular Posts
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • Artificial Intelligence – its use and misuse Artificial Intelligence – its use and misuse February 4, 2019
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.