• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Cybersecurity and cyber intelligence for a machine determined future

Cybersecurity and cyber intelligence for a machine determined future

Estimated reading time: 3 minutes

With the world moving towards a machine determined future, somewhere deep within, it does bother many of us when we think about the power we intend to leave in the hands of machines. Honestly, some of us are worried...
Read Blog
September 25, 2017

Healthcare IoT: The lesser known dangers of cyber attacks

Healthcare IoT: The lesser known dangers of cyber attacks

Estimated reading time: 3 minutes

Medical devices under cyber threat certainly make for some scary headlines. It’s not even an exaggeration when we say that healthcare essentials are the upcoming security nightmares; with hackers on a constant lookout for gaining access to secured systems....
Read Blog
September 22, 2017

Security scorecard: How much does your organization score?

Security scorecard: How much does your organization score?

Estimated reading time: 3 minutes

An organization spends significant amount of money and effort on implementing cybersecurity yet it can be breached. In such situations, how does an organization identify if it had taken enough measures to protect itself before the breach occurred? This is where a security...
Read Blog
September 21, 2017

Use CAA DNS records for SSL Certificate and minimize cyber threats

Use CAA DNS records for SSL Certificate and minimize cyber threats

Estimated reading time: 3 minutes

SSL or Secure Sockets Layer (commonly referred as HTTPS) has now become a necessity for protecting your websites whether it is handling any sensitive information or not. An organization needs to install SSL certificate, issued by a Certificate Authority...
Read Blog
September 21, 2017

Mobile Device Management: How to manage security of your mobile devices

Mobile Device Management: How to manage security of your mobile devices

Estimated reading time: 3 minutes

Smartphones have made way into our personal and professional life. Apart from always being connected to the world, there are many business functions that users, today, perform with their smartphones. Business emails, document reviews, editing, and video conferencing are just...
Read Blog
September 20, 2017

Impact of malware/ransomware attacks on Government data

Impact of malware/ransomware attacks on Government data

Estimated reading time: 3 minutes

Malware/ransomware attacks continue to affect the cyberspace with several critical sectors impacted in the worst possible manner. Cyber threats and instances of hacking are also succeeding at a rapid rate. That said, it is the Government data that’s actually...
Read Blog
September 19, 2017

5 key takeaways from major data breaches

5 key takeaways from major data breaches

Estimated reading time: 3 minutes

Cyber-attacks, hacks or data breaches have become common in recent times. Be it large scale businesses or a startup; no one is safe from the ever-growing cyber threat landscape. While keeping track of all cyber-attacks is not possible for...
Read Blog
September 18, 2017

How is new technology bringing risk to the Government?

How is new technology bringing risk to the Government?

Estimated reading time: 3 minutes

Use of technology provides improvements in productivity, cost savings and more accurate process execution in almost all industries. This applies to both private and public sector (Government bodies). Use of technology reduces back logs, increases the speed of processes and improves overall...
Read Blog
September 15, 2017

CVE-2017-8759 – .NET Framework Remote Code Execution Vulnerability

CVE-2017-8759 – .NET Framework Remote Code Execution Vulnerability

Estimated reading time: 2 minutes

The recent zero-day vulnerability in .NET Framework vulnerability CVE-2017-8759 enables attackers to perform a Remote Code Execution on the targeted machine. This vulnerability is found to be exploited in the wild through email spam messages loaded with malicious RTF files...
Read Blog
September 14, 2017

Cybersecurity trends and predictions to watch out for in 2017

Cybersecurity trends and predictions to watch out for in 2017

Estimated reading time: 3 minutes

If 2016 was the year of data breaches, 2017 might just well take things to a whole new level; precisely when it comes to cybersecurity threats. Hackers have newer tools in their arsenal which have multiplied difficulties for organizations—...
Read Blog
September 14, 2017
← Previous 1 … 58 59 60 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies