• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Email could be one of the simplest ways for hackers to breach your organization

Email could be one of the simplest ways for hackers to breach your organization

Estimated reading time: 3 minutes

What is common between Sarah Palin, George HW Bush, and John Podesta? Apart from being important political figures in the United States, there’s another fact that unites them – they’ve all been victims of messy email hacks. Sometimes, danger...
Read Blog
July 9, 2019

DDoS attacks – Protection is better than cure

DDoS attacks – Protection is better than cure

Estimated reading time: 3 minutes

DDoS Attacks on Rise….  As per recent cyber security reports, there has been a rise in DDoS attacks in Q1 2019, with number of attacks lasting more than an hour. Many researchers believe that cyber attackers who had been doing DDoS attacks for monetary gain, had focused their...
Read Blog
July 5, 2019

Protect sensitive information with Seqrite Encryption

Protect sensitive information with Seqrite Encryption

Estimated reading time: 3 minutes

Among the most important assets that an enterprise possesses, data is undoubtedly the most important. In today’s digital age, there are reams of data being processed, transmitted and disseminated every millisecond and much of the world’s economy runs on...
Read Blog
July 3, 2019

Ransomware As A Tool – LockerGoga

Ransomware As A Tool – LockerGoga

Estimated reading time: 4 minutes

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a...
Read Blog
July 3, 2019

Why someone needs VPN?

Why someone needs VPN?

Estimated reading time: 3 minutes

What is VPN? A VPN, or virtual private network, is a secure tunnel between your device and the internet. It is an encrypted connection which is used to protect your online traffic from snooping, interference, and censorship. It allows...
Read Blog
July 2, 2019

Key benefits of Seqrite Secure Web Gateway

Key benefits of Seqrite Secure Web Gateway

Estimated reading time: 2 minutes

Enterprises are recently waking up to the usefulness of having layered protection for their networks. This involves investing in various layers of protection such as anti-virus, anti-malware, anti-spyware and a firewall. However, firewalls while providing protection can often fall...
Read Blog
June 27, 2019

Email technology and its security in nutshell

Email technology and its security in nutshell

Estimated reading time: 5 minutes

Email has become a necessity of day-to-day communication. We can realize the importance of email with the fact that the down-time of organization email server directly affects the organization’s productivity. Email has become most prominent and integral part of...
Read Blog
June 26, 2019

Beware! Email attachments can make you victim of spear phishing attacks

Beware! Email attachments can make you victim of spear phishing attacks

Estimated reading time: 4 minutes

In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. In...
Read Blog
June 21, 2019

Make Seqrite UTM the first line of defense for your enterprise

Make Seqrite UTM the first line of defense for your enterprise

Estimated reading time: 2 minutes

Network security has traditionally been a number one priority for enterprises. As the reliance on the Internet has increased, enterprises have invested in traditional network security solutions which aim to protect trusted internal networks from external actors. For this...
Read Blog
June 20, 2019

Harnessing Machine Learning and Automation against Advanced Threats

Harnessing Machine Learning and Automation against Advanced Threats

Estimated reading time: 2 minutes

With the specter of advanced cybersecurity threats always on the horizon, enterprises are seriously considering harnessing the power of machine learning and automation to fight against these threats. For good reason too – a cybersecurity survey suggested that organizations...
Read Blog
June 12, 2019
← Previous 1 … 28 29 30 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies