• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite

The Data breach inferno burning big-ticket businesses

Data breach volumes worry governments and businesses

Estimated reading time: 2 minutes

The recent surge of data breaches in different Indian companies has left security stakeholders worried. It is a clear indicator that enterprises will have to do much more to ensure they keep sensitive customer data safe. Perhaps, the most...
Read More
February 5, 2021

BEC and Ransomware attacks increase during the pandemic

BEC and Ransomware attacks unsettle businesses globally.

Estimated reading time: 2 minutes

The ongoing COVID-19 pandemic has had a far-reaching impact on the world as we know —it has also led to a huge increase in cyber frauds. Emboldened by the chaos and instability caused by the pandemic, threat actors have...
Read More
January 22, 2021

Are we prepared against risks generating from the IoT revolution?

Increased adoption of IoT creates a brand-new attack surface.

Estimated reading time: 2 minutes

According to IoT Analytics, the number of Internet of Things (IoT) devices is expected to grow to a massive 22 billion by 2025. Bain & Company estimates that the value of the combined IoT market to be USD 520...
Read More
January 15, 2021

Proactiveness is the key to resolving hybrid cloud’s security challenges

Recognize Hybrid Cloud’s unique security challenges.

Estimated reading time: 2 minutes

The hybrid cloud model is fast becoming the environment of choice for enterprises. The reasons are simple: this model offers a seamless mix of convenience and security. Chief Information Officers appreciate the convenience of hybrid cloud models, offering organizations...
Read More
January 6, 2021

How can EdTech companies deal with rising security challenges?

How can the EdTech Sector deal with mounting security challenges

Estimated reading time: 2 minutes

Institutes and organizations across the world are using EdTech to complement their offerings further. However, it is also important to understand that the rapidly rising EdTech industry is also vulnerable to certain security challenges which can prove damaging. A...
Read More
December 24, 2020

RAT used by Chinese cyberspies infiltrating Indian businesses

Chinese cyber spies breach the Indian enterprise

Estimated reading time: 5 minutes

A few months back, Delphibased malware was being distributed on multiple systems via SMB exploit. The payloads used by this malware have close similarities with open-source Gh0stRAT code. Gh0st has been used by Chinese threat actors to target multiple...
Read More
December 18, 2020

Are air-gapped networks completely secure?

Are air-gapped networks immune to cyberattacks?

Estimated reading time: 2 minutes

An air-gapped network (or system) is isolated from all other networks. This essentially means that the system or the network is physically not connected to any outside network, whether it is the internet or a local area network. The...
Read More
December 17, 2020

Cybersecurity in the holiday season: minimizing the risk of cyberattacks

Protect your business from specialized cyberattacks, this holiday season.

Estimated reading time: 2 minutes

The holiday season is upon us. While employees take time off to be with their families and enjoy some well-deserved rest and recognition, cybersecurity cannot afford to take it easy. It’s a clear fact that the holiday season is...
Read More
December 11, 2020

Can cyber insurance replace cybersecurity?

Should businesses prioritize cyber insurance over cybersecurity?

Estimated reading time: 2 minutes

As new-age threats dominate the business landscape, an increasing number of organizations have come to identify cyber insurance as a key component of their risk management plan. Organizations understand that cybersecurity threats can cause a great deal of financial...
Read More
December 7, 2020

Is accelerating enterprise digital transformation leading to cyberthreats?

Is accelerating enterprise digital transformation leading to cyberthreats?

Estimated reading time: 3 minutes

Without a doubt, 2020 will go down in history as a year which changed the course of humanity. While the jury is still out on whether this change has been good or bad, it cannot be denied that the...
Read More
November 25, 2020
← Previous 1 2 3 … 59 Next →

Popular Posts

  • New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form March 22, 2021
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • Nation-states shoot from somebody else’s shoulder Nation-states shoot from somebody else’s shoulder March 10, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Stay Updated!

Topics

Antivirus For Linux (10) apt (10) Bitcoin (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (284) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (14) EPS (9) Exploit (12) firewall (11) GDPR (10) IoT (10) malware (59) malware attack (23) malware attacks (12) MDM (25) Network security (18) Patch Management (12) phishing (17) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite Workspace
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.