• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Massive campaign delivering Monero Miner via compromised websites!

Massive campaign delivering Monero Miner via compromised websites!

Estimated reading time: 4 minutes

Ransomware outbreaks have been on the rise for quite some time now but suddenly we are observing a change in this trend.  Seems like the rise observed in cryptocurrency valuations especially for Bitcoins is making attackers to go after...
Read Blog
November 24, 2017

Effective Patch Management requires a well-defined strategy

Effective Patch Management requires a well-defined strategy

Estimated reading time: 3 minutes

Patch Management holds a lot of relevance in an organization’s cybersecurity plan. Most hackers are on a continuous look out for system vulnerabilities to barge into IT network. This in turn offers them an opportunity to steal intellectual property...
Read Blog
November 23, 2017

The role of internal audit in cybersecurity

The role of internal audit in cybersecurity

Estimated reading time: 3 minutes

Cyber-attacks are constantly posing threats of significant proportions, and it’s important to consider their evolving nature while setting up a response plan. Be it dealing with the growing economic espionage or acts of internal and external corruption; companies often...
Read Blog
November 22, 2017

Reasons to consider managed security services

Reasons to consider managed security services

Estimated reading time: 3 minutes

Dealing with the existing cyber threat landscape requires not just a state of the art security tool but also skill and technological expertise to manage the overall organizational security. It is here that managed security services come as a...
Read Blog
November 21, 2017

Industrial cybersecurity: Addressing business challenges

Industrial cybersecurity: Addressing business challenges

Estimated reading time: 3 minutes

Industrial cybersecurity has evolved over the years and currently we have a host of strategies and implementations for securing the Supervisory Control And Data Acquisition  (SCADA) systems and varied industrial plants. While cybersecurity awareness has improved for many companies willing...
Read Blog
November 17, 2017

Why should companies invest in evolving cybersecurity technology?

Why should companies invest in evolving cybersecurity technology?

Estimated reading time: 3 minutes

With the cyber-threat landscape evolving with time, we are continually witnessing newer strains of malware attacking IT security networks. Needless to say, organizations are losing their ground, and it’s time they address the issues at hand by innovating the...
Read Blog
November 16, 2017

Remember the security basics as your cybersecurity strategy evolves

Remember the security basics as your cybersecurity strategy evolves

Estimated reading time: 3 minutes

Most cybersecurity strategies thrive on advanced technologies when it comes to mitigating complex threats. In the meanwhile, CISOs and the concerned IT heads tend to ignore the basic precautions and security standards required for preventing data breaches. Although technological...
Read Blog
November 15, 2017

Seqrite receives No. 1 rating in AV – Comparatives Performance Test

Seqrite receives No. 1 rating in AV – Comparatives Performance Test

Estimated reading time: 2 minutes

Seqrite Endpoint Security v 17.0 has received no. 1 rating in Anti-Virus Comparative Performance Test for September 2017. These tests evaluate the impact of anti-virus software on system performance. AV Comparatives evaluated 21 security software and Seqrite scored the...
Read Blog
November 14, 2017
210
Shares

Vulnerabilities are unavoidable: Here are the top 5 commandments of Vulnerability Scan

Vulnerabilities are unavoidable: Here are the top 5 commandments of Vulnerability Scan

Estimated reading time: 3 minutes

Organizations using software modules are more likely to get affected by intruders and unsolicited access. Moreover, if the software is popular, there are additional chances that the connected services and written codes might attract hackers and malicious parties. Security...
Read Blog
November 14, 2017

Top 5 most wanted cybercriminals across the globe

Top 5 most wanted cybercriminals across the globe

Estimated reading time: 3 minutes

Cyber-crime is being widely discussed as a critical topic holding global relevance. In the professional discourse, it is essential that businesses, government-specific entities, and even citizens are vigilant enough when it comes to avoiding the potential threats. This also...
Read Blog
November 13, 2017
← Previous 1 … 53 54 55 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies