• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

What are the different techniques of intruding networks?

What are the different techniques of intruding networks?

Estimated reading time: 2 minutes

Network performance is the key indicator of an enterprise’s productivity and health in these connected times. It is the prerequisite of every business enterprise to maintain a smooth network workflow; however, that is easier said than done. Enterprise networks...
Read Blog
December 19, 2019

New and Improved Scan Engine

New and Improved Scan Engine

Estimated reading time: 2 minutes

Summary: We are happy to announce the availability of “best-in-class”, indigenously developed new and improved AV Scan Engine that implements advanced technology to provide maximum protection against evolving global threats and includes following improvements: Lightweight: Reduced disk footprint Reduced...
Read Blog
December 19, 2019

What is Network Forensics and how does it help cybersecurity professionals?

What is Network Forensics and how does it help cybersecurity professionals?

Estimated reading time: 2 minutes

Network forensics refers to a branch of digital forensics, chiefly involved with the collection and analysis of network traffic for the purpose of understanding evidence about cybercrimes for preventing it. A report from the European Union Agency for Cybersecurity...
Read Blog
December 17, 2019

Anti-Ransomware software is not a data backup solution!

Anti-Ransomware software is not a data backup solution!

Estimated reading time: 2 minutes

Over 30,000 customers across the globe rely on Seqrite’s cutting-edge Anti-Ransomware capabilities to protect businesses from being taken as hostages by hackers. Quick Heal, the parent company of enterprise cybersecurity brand Seqrite, had predicted ransomware to be the menace...
Read Blog
December 13, 2019

Enterprise security in the age of nation-state cybersecurity threats

Enterprise security in the age of nation-state cybersecurity threats

Estimated reading time: 2 minutes

The digital modern battlefield has proven time-and-again that cyberattacks, just like tanks and guns, are one of the biggest weapons that a country possesses to wage a war. All over the world, nation-states are surreptitiously or, in some cases,...
Read Blog
December 12, 2019

How can the CISO tackle the challenge of talent shortage?

How can the CISO tackle the challenge of talent shortage?

Estimated reading time: 3 minutes

Year-after-year, apart from malware, the cybersecurity industry continues to face the major threat of finding skilled professionals. It’s a crisis that has been validated by concerning numbers from different sources — a report in 2018 by the International Information...
Read Blog
December 11, 2019

Mitigating cyber threats through Better data protection

Mitigating cyber threats through Better data protection

Estimated reading time: 2 minutes

In September 2019, a massive data breach impacted an estimated 20 million people in the South American country of Ecuador. The population of Ecuador itself is 17 million which meant almost the entire population was at risk due to...
Read Blog
December 9, 2019

Will Automation be the next big weapon against cyber threats?

Will Automation be the next big weapon against cyber threats?

Estimated reading time: 2 minutes

The Ponemon Institute recently completed a survey on ‘Staffing the IT Security Function In the Age of Automation’ in an attempt to understand the effect of automation on IT security. 49 % of respondents to this survey felt that...
Read Blog
December 5, 2019

Leveraging security analytics to bolster enterprise cybersecurity

Leveraging security analytics to bolster enterprise cybersecurity

Estimated reading time: 2 minutes

Without data, you’re just another person with an opinion” – W. Edwards Deming Widely used across different industries, security analytics is slowly making its way into the domain of cybersecurity — courtesy to this industry’s rising awareness about the...
Read Blog
December 4, 2019

Seqrite UTM : Security Weapon Against Man In The Middle Attacks

Seqrite UTM : Security Weapon Against Man In The Middle Attacks

Estimated reading time: 6 minutes

As implied in the name itself, Man In The Middle Attack is a type of attack where a illegal person tries to intercept the communication between two parties. Either to secretly overhear or to steal the critical data being...
Read Blog
December 3, 2019
← Previous 1 … 22 23 24 … 73 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies