• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Security Archive

Security scorecard: How much does your organization score?

Security scorecard: How much does your organization score?

Estimated reading time: 3 minutes

An organization spends significant amount of money and effort on implementing cybersecurity yet it can be breached. In such situations, how does an organization identify if it had taken enough measures to protect itself before the breach occurred? This is where a security...
Read Blog
September 21, 2017

Use CAA DNS records for SSL Certificate and minimize cyber threats

Use CAA DNS records for SSL Certificate and minimize cyber threats

Estimated reading time: 3 minutes

SSL or Secure Sockets Layer (commonly referred as HTTPS) has now become a necessity for protecting your websites whether it is handling any sensitive information or not. An organization needs to install SSL certificate, issued by a Certificate Authority...
Read Blog
September 21, 2017

CVE-2017-8759 – .NET Framework Remote Code Execution Vulnerability

CVE-2017-8759 – .NET Framework Remote Code Execution Vulnerability

Estimated reading time: 2 minutes

The recent zero-day vulnerability in .NET Framework vulnerability CVE-2017-8759 enables attackers to perform a Remote Code Execution on the targeted machine. This vulnerability is found to be exploited in the wild through email spam messages loaded with malicious RTF files...
Read Blog
September 14, 2017

Discovered data breach? What’s your strategy to manage cyber attack in the financial sector?

Discovered data breach? What’s your strategy to manage cyber attack in the financial sector?

Estimated reading time: 3 minutes

Cyber breaches are getting more and more common these days. If you are running a business, the chances are that you will be a victim of at least one breach in the lifetime of the business. The likelihood of a breach increases if...
Read Blog
September 13, 2017

New Hacking Threats: Biometric Vulnerabilities

New Hacking Threats: Biometric Vulnerabilities

Estimated reading time: 3 minutes

Biometric authentication seems to be the authentication technology of the future. Scan the finger on the finger print scanner and payment is done for your purchase. No need to type out your card details and enter OTPs. Scan your...
Read Blog
September 11, 2017

CVE-2017-9805 – Apache Struts 2 Remote Code Execution Vulnerability

CVE-2017-9805 – Apache Struts 2 Remote Code Execution Vulnerability

Estimated reading time: 2 minutes

A critical remote code execution vulnerability has been discovered in famous web application framework Apache Struts, which allows attackers to execute arbitrary code. To address this issue, Apache Struts has issued a security advisory and CVE-2017-9805 has been assigned...
Read Blog
September 7, 2017

Seqrite Cybersecurity Quiz

Seqrite Cybersecurity Quiz

Estimated reading time: < 1 minute

Are you one of those who know-it-all about cybersecurity? Test you knowledge with this cybersecurity quiz and tweet your scores to @Seqrite with #SeqriteQuiz.
Read Blog
September 1, 2017
1

Why your startup needs dedicated security solutions?

Why your startup needs dedicated security solutions?

Estimated reading time: 3 minutes

Startups usually have a lot on their plate when it comes to managing finances and security solutions. However, more often than not, the budding entrepreneurs fall short of resources needed for hiring the concerned workforce. While some resort to...
Read Blog
August 31, 2017

Why should you keep a back-up of all your data?

Why should you keep a back-up of all your data?

Estimated reading time: 3 minutes

Modern businesses depend heavily on the continuous availability of data be it of the customer, product, employee or financial. Data, in any form (files, emails, collaboration tool or database) must always be available when required. Just like any other asset, loss...
Read Blog
August 29, 2017
7
Shares

Not investing in cybersecurity can lead to ‘Inverse ROI’ for your business

Not investing in cybersecurity can lead to ‘Inverse ROI’ for your business

Estimated reading time: 3 minutes

Almost every country spends a large amount of its wealth on its military. It spends billions of dollars in buying latest arms and ammunition. Yet, barring a few instances, those weapons are hardly used. To a layman, it seems...
Read Blog
August 28, 2017
← Previous 1 … 3 4 5 … 8 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies