• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Are we prepared against risks generating from the IoT revolution?

Are we prepared against risks generating from the IoT revolution?

Estimated reading time: 2 minutes

According to IoT Analytics, the number of Internet of Things (IoT) devices is expected to grow to a massive 22 billion by 2025. Bain & Company estimates that the value of the combined IoT market to be USD 520...
Read Blog
January 15, 2021

Proactiveness is the key to resolving hybrid cloud’s security challenges

Proactiveness is the key to resolving hybrid cloud’s security challenges

Estimated reading time: 2 minutes

The hybrid cloud model is fast becoming the environment of choice for enterprises. The reasons are simple: this model offers a seamless mix of convenience and security. Chief Information Officers appreciate the convenience of hybrid cloud models, offering organizations...
Read Blog
January 6, 2021

How can EdTech companies deal with rising security challenges?

How can EdTech companies deal with rising security challenges?

Estimated reading time: 2 minutes

Institutes and organizations across the world are using EdTech to complement their offerings further. However, it is also important to understand that the rapidly rising EdTech industry is also vulnerable to certain security challenges which can prove damaging. A...
Read Blog
December 24, 2020

RAT used by Chinese cyberspies infiltrating Indian businesses

RAT used by Chinese cyberspies infiltrating Indian businesses

Estimated reading time: 4 minutes

A few months back, Delphibased malware was being distributed on multiple systems via SMB exploit. The payloads used by this malware have close similarities with open-source Gh0stRAT code. Gh0st has been used by Chinese threat actors to target multiple...
Read Blog
December 18, 2020

Are air-gapped networks completely secure?

Are air-gapped networks completely secure?

Estimated reading time: 2 minutes

An air-gapped network (or system) is isolated from all other networks. This essentially means that the system or the network is physically not connected to any outside network, whether it is the internet or a local area network. The...
Read Blog
December 17, 2020

Cybersecurity in the holiday season: minimizing the risk of cyberattacks

Cybersecurity in the holiday season: minimizing the risk of cyberattacks

Estimated reading time: 2 minutes

The holiday season is upon us. While employees take time off to be with their families and enjoy some well-deserved rest and recognition, cybersecurity cannot afford to take it easy. It’s a clear fact that the holiday season is...
Read Blog
December 11, 2020

Can cyber insurance replace cybersecurity?

Can cyber insurance replace cybersecurity?

Estimated reading time: 2 minutes

As new-age threats dominate the business landscape, an increasing number of organizations have come to identify cyber insurance as a key component of their risk management plan. Organizations understand that cybersecurity threats can cause a great deal of financial...
Read Blog
December 7, 2020

Is accelerating enterprise digital transformation leading to cyberthreats?

Is accelerating enterprise digital transformation leading to cyberthreats?

Estimated reading time: 3 minutes

Without a doubt, 2020 will go down in history as a year which changed the course of humanity. While the jury is still out on whether this change has been good or bad, it cannot be denied that the...
Read Blog
November 25, 2020

IT-OT confluence creates cybersecurity gaps for enterprises

IT-OT confluence creates cybersecurity gaps for enterprises

Estimated reading time: 2 minutes

According to Seqrite’s Threat Report from Q2 2020, the manufacturing industry saw the greatest percentage of attacks in comparison to other sectors. Other industries targeted included Power & Energy and Automobiles, all which use Operational Technology (OT) to a...
Read Blog
November 20, 2020

Thanos Ransomware Evading Anti-ransomware Protection With RIPlace Tactic

Thanos Ransomware Evading Anti-ransomware Protection With RIPlace Tactic

Estimated reading time: 5 minutes

Ransomware has come a long way in cyberspace by continuous improvement in its techniques and tactics in encrypting system files. Over the years ransomware has improvised itself by moving from PE to non-PE and standalone payloads, by using different...
Read Blog
November 18, 2020
← Previous 1 … 15 16 17 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (321) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies