• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Pegasus like spyware could be snooping on you right now!!

Pegasus like spyware could be snooping on you right now!!

Estimated reading time: 4 minutes

The recent news of Pegasus spyware attack via WhatsApp that targeted lawyers, journalists and human rights activists, offers an astonishing revelation on the kind of havoc such spyware can create. We covered the topic extensively, recently. The frequent media...
Read Blog
November 22, 2019

Why should enterprise directors get cybersecurity experts on board?

Why should enterprise directors get cybersecurity experts on board?

Estimated reading time: 2 minutes

The board of directors provide good governance and build a strategy for the enterprise. The successful running and well-being of a business often depend on the vision and direction provided by a competent board as they decide and execute...
Read Blog
November 21, 2019

Is a chief cybersecurity officer critical for the enterprise?

Is a chief cybersecurity officer critical for the enterprise?

Estimated reading time: 3 minutes

In 2015, the Government of India established a first of sorts – they created a chief cybersecurity officer position under the Prime Minister’s Office. Dr Gulshan Rai became the special secretary for cybersecurity and after serving four years in...
Read Blog
November 20, 2019

Information security is a business concern, not just an IT concern!

Information security is a business concern, not just an IT concern!

Estimated reading time: 2 minutes

The global research and advisory firm Gartner estimated that worldwide information security spending would exceed $124 billion in 2019. The reason for such spending in information security is justified when one looks at the consequences of ignoring the risk...
Read Blog
November 19, 2019

How can CISOs defend businesses from supply chain attacks?

How can CISOs defend businesses from supply chain attacks?

Estimated reading time: 3 minutes

A supply chain is an omnipresent and inseparable element in every business, irrespective of its size.  Hence, when it comes to cybersecurity specific to this aspect, simply protecting an enterprise’s periphery isn’t enough. Supply chains consist of people, logistics,...
Read Blog
November 18, 2019

Top five cybersecurity challenges for the CISO

Top five cybersecurity challenges for the CISO

Estimated reading time: 3 minutes

Thanks to increasing cyberthreats, the role of the Chief Information Security Officer (CISO) in an organization is only expanding. More and more CISOs are now part of senior leadership teams, reporting directly to the Chief Executive Officer. There is...
Read Blog
November 14, 2019

How much did cyberattacks cost organizations in 2018?

How much did cyberattacks cost organizations in 2018?

Estimated reading time: 3 minutes

In today’s day, it has become common knowledge that cyberattacks are dangerous for an organization. However, sometimes, people within the organization can differ on the exact impact of these threats. These differences can often blindside businesses on the total...
Read Blog
November 13, 2019

The past, present and future of cybersecurity

The past, present and future of cybersecurity

Estimated reading time: 3 minutes

The evolution of cybersecurity is both, fascinating and intriguing. Today’s cybersecurity professionals have immense responsibility and burden compared to yesteryears – they have to tackle with a wide range of cyberthreats such as malware, insider attacks & Distributed Denial...
Read Blog
November 12, 2019

BlueKeep Attacks seen in the wild!

Estimated reading time: 2 minutes

CVE-2019-0708, popularly known as BlueKeep, is a RDP pre-authentication vulnerability which allows attacker to compromise a vulnerable system without user’s interaction. This exploit is also wormable, meaning that it can spread to other vulnerable systems in a similar way...
Read Blog
November 8, 2019

The importance of cybersecurity for satellite communications

The importance of cybersecurity for satellite communications

Estimated reading time: 3 minutes

A  major part of human communications today is dependent on satellites. More so,  global navigation systems, military strategies, information collection, environment research, and even the internet are all dependent on the smooth functioning and continuous integration with these valuable...
Read Blog
November 8, 2019
← Previous 1 … 23 24 25 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (321) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies