• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Complying with data privacy laws will be a key priority in the new normal

Complying with data privacy laws will be a key priority in the new normal

Estimated reading time: 3 minutes

As a concept, privacy is seeing a paradigm shift in terms of its importance. Traditionally, for a developing country like India with its myriad of sociological and infrastructural issues, privacy came quite low on the priority list. However, with...
Read Blog
March 19, 2021

Nation-states shoot from somebody else’s shoulder

Nation-states shoot from somebody else’s shoulder

Estimated reading time: 3 minutes

The ever-changing nature of cyberthreats from Nation-States has recently come into sharp focus with the hacking of FireEye. Part of an overall larger cyberwarfare campaign against the United States government, the hacking is a reminder of an essential truism...
Read Blog
March 10, 2021

Businesses now worried about the surge in COVID-19 infodemic

Businesses now worried about the surge in COVID-19 infodemic

Estimated reading time: 2 minutes

The world is daring to hope again as there may finally be a finish line in sight to the unprecedented COVID-19 pandemic. Many countries have imitated vaccine distribution programs aiming to make their populations immune to the virus. While...
Read Blog
February 26, 2021

Turn the Page: Cybersecurity Predictions for 2021 & beyond

Turn the Page: Cybersecurity Predictions for 2021 & beyond

Estimated reading time: 2 minutes

Making accurate predictions, especially for cybersecurity needs years of experience — 2020 was a different situation altogether. Amidst many forecasts, no one predicted the onslaught of a global pandemic that would disrupt the world as we know it, baffling...
Read Blog
February 18, 2021

Pharma Sector needs to streamline its insides to avoid cyberattacks

Pharma Sector needs to streamline its insides to avoid cyberattacks

Estimated reading time: 2 minutes

2020 has been a year when pharma companies have been in the spotlight. The unprecedented COVID-19 pandemic, while shuttering offices and impacting lives across the globe, led to an immediate upsurge in interest for a potential vaccine. With much...
Read Blog
February 12, 2021

The Data breach inferno burning big-ticket businesses

The Data breach inferno burning big-ticket businesses

Estimated reading time: 2 minutes

The recent surge of data breaches in different Indian companies has left security stakeholders worried. It is a clear indicator that enterprises will have to do much more to ensure they keep sensitive customer data safe. Perhaps, the most...
Read Blog
February 5, 2021

BEC and Ransomware attacks increase during the pandemic

BEC and Ransomware attacks increase during the pandemic

Estimated reading time: 2 minutes

The ongoing COVID-19 pandemic has had a far-reaching impact on the world as we know —it has also led to a huge increase in cyber frauds. Emboldened by the chaos and instability caused by the pandemic, threat actors have...
Read Blog
January 22, 2021

Are we prepared against risks generating from the IoT revolution?

Are we prepared against risks generating from the IoT revolution?

Estimated reading time: 2 minutes

According to IoT Analytics, the number of Internet of Things (IoT) devices is expected to grow to a massive 22 billion by 2025. Bain & Company estimates that the value of the combined IoT market to be USD 520...
Read Blog
January 15, 2021

Proactiveness is the key to resolving hybrid cloud’s security challenges

Proactiveness is the key to resolving hybrid cloud’s security challenges

Estimated reading time: 2 minutes

The hybrid cloud model is fast becoming the environment of choice for enterprises. The reasons are simple: this model offers a seamless mix of convenience and security. Chief Information Officers appreciate the convenience of hybrid cloud models, offering organizations...
Read Blog
January 6, 2021

How can EdTech companies deal with rising security challenges?

How can EdTech companies deal with rising security challenges?

Estimated reading time: 2 minutes

Institutes and organizations across the world are using EdTech to complement their offerings further. However, it is also important to understand that the rapidly rising EdTech industry is also vulnerable to certain security challenges which can prove damaging. A...
Read Blog
December 24, 2020
← Previous 1 … 14 15 16 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies