• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Security Archive

Leveraging security analytics to bolster enterprise cybersecurity

Leveraging security analytics to bolster enterprise cybersecurity

Estimated reading time: 2 minutes

Without data, you’re just another person with an opinion” – W. Edwards Deming Widely used across different industries, security analytics is slowly making its way into the domain of cybersecurity — courtesy to this industry’s rising awareness about the...
Read Blog
December 4, 2019

Renewed interests in excelling Security Operation Centres?

Renewed interests in excelling Security Operation Centres?

Estimated reading time: 2 minutes

According to Gartner’s Top 7 Security and Risk Trends 2019 report, a renewed interest towards excelling Security Operation Centres (SOCs) has been considered as among the top two new trends of the year. The evolution of the Security Operations...
Read Blog
November 1, 2019

CVE-2019-0708 – A Critical “Wormable” Remote Code Execution Vulnerability in Windows RDP

CVE-2019-0708 – A Critical “Wormable” Remote Code Execution Vulnerability in Windows RDP

Estimated reading time: 2 minutes

This is an important security advisory related to a recently patched Critical remote code execution vulnerability in Microsoft Windows Remote Desktop Service (RDP). The vulnerability is identified as “CVE-2019-0708 – Remote Desktop Services Remote Code Execution Vulnerability”. MSRC blog mentions...
Read Blog
May 17, 2019

Employees working on their personal devices? How to secure them

Employees working on their personal devices? How to secure them

Estimated reading time: 3 minutes

Work on personal devices. Employees love them. A lot of small companies and MSMEs are increasingly embracing Bring Your Own Device (BYOD) policies. But IT security is still skeptic about it. There’s a clear clash of wills here and...
Read Blog
March 15, 2019
14
Shares

CyberSecurity First Responders: Who are they and why enterprises should hire them

CyberSecurity First Responders: Who are they and why enterprises should hire them

Estimated reading time: 3 minutes

In our day-to-day lives, emergencies or accidents can and do happen. It can be on the roads, in the air, on the tracks – anywhere. When an incident like this occurs, the first people on the scene are the...
Read Blog
March 8, 2019
9
Shares

Everything you need to know about RBI’s Circular on Basic Security Framework for Primary UCBs

Everything you need to know about RBI’s Circular on Basic Security Framework for Primary UCBs

Estimated reading time: 4 minutes

The recent spate of cyber-attacks on banks in India has left everyone worried. For those who haven’t kept count, Pune-based Cosmos Bank recently saw a massive security breach where Rs 94 crore was siphoned off. In a similar incident,...
Read Blog
November 12, 2018
27
Shares

Importance of SSL certificate for your company website

Importance of SSL certificate for your company website

Estimated reading time: 3 minutes

Anyone who browses the Internet is probably aware of the term SSL. It’s often bandied around as a term which people vaguely understand to be something connected to keeping your browsing data safe. For a lot of people, SSL...
Read Blog
October 29, 2018
18
Shares

The true cost of a data breach

The true cost of a data breach

Estimated reading time: 3 minutes

Data breaches are bad news. Whether it’s the CEO, the CISO or a network administrator, data breaches represent a significant threat which can have potentially catastrophic consequence. The threat of data breaches has only increased in recent years leading...
Read Blog
October 26, 2018
11
Shares

Top 5 trends security teams should begin embracing to manage digital risk

Top 5 trends security teams should begin embracing to manage digital risk

Estimated reading time: 3 minutes

The digital world has opened up a plethora of opportunities for workplaces across the globe. Digital transformation means, among other things, seamless connectivity, the erasure of physical barriers and enterprises that can leverage the freedom of knowledge sharing without...
Read Blog
October 24, 2018
7
Shares

Deep analysis of AZORult – The information exfiltrator

Deep analysis of AZORult – The information exfiltrator

Estimated reading time: 5 minutes

While the current focus in the cyberspace is on Ransomware and Cryptominers there are other prevalent threat actors silently making their way into victim’s machine in order to comprise it for malicious purpose. During the daily threat hunting task,Quick...
Read Blog
October 16, 2018
1 2 … 8 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies