• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Search Results

10 Reasons Why CISOs Must Leverage XDR For Enterprise Security

10 Reasons Why CISOs Must Leverage XDR For Enterprise Security

Estimated reading time: 3 minutes

10 Reasons Why CISOs Must Leverage XDR For Enterprise Security Today enterprises face an ever-growing array of sophisticated threats that demand a comprehensive and proactive defense strategy.  In the face of these growing cyber threats, CISOs are overwhelmed with...
Read Blog
June 19, 2024

How can the CISO tackle the challenge of talent shortage?

How can the CISO tackle the challenge of talent shortage?

Estimated reading time: 3 minutes

Year-after-year, apart from malware, the cybersecurity industry continues to face the major threat of finding skilled professionals. It’s a crisis that has been validated by concerning numbers from different sources — a report in 2018 by the International Information...
Read Blog
December 11, 2019

Crucial aspects CISOs should look at while building a businesses’ cybersecurity roadmap

Crucial aspects CISOs should look at while building a businesses’ cybersecurity roadmap

Estimated reading time: 3 minutes

Cybersecurity has had a heightened impact in 2019, made visible by the growing responsibilities of the Chief Information Security Officer (CISO). A decade back, cybersecurity was a function looked at by Chief Information Officers and IT teams. However, cybersecurity...
Read Blog
November 27, 2019

How can CISOs defend businesses from supply chain attacks?

How can CISOs defend businesses from supply chain attacks?

Estimated reading time: 3 minutes

A supply chain is an omnipresent and inseparable element in every business, irrespective of its size.  Hence, when it comes to cybersecurity specific to this aspect, simply protecting an enterprise’s periphery isn’t enough. Supply chains consist of people, logistics,...
Read Blog
November 18, 2019

Top five cybersecurity challenges for the CISO

Top five cybersecurity challenges for the CISO

Estimated reading time: 3 minutes

Thanks to increasing cyberthreats, the role of the Chief Information Security Officer (CISO) in an organization is only expanding. More and more CISOs are now part of senior leadership teams, reporting directly to the Chief Executive Officer. There is...
Read Blog
November 14, 2019

Why do boards need to empower their CISO?

Why do boards need to empower their CISO?

Estimated reading time: 2 minutes

A generation ago, the Chief Information Security Officer (CISO) role rarely existed in enterprises and even if it did, it only existed in large to very large organizations. Even here CISOs were mostly system administrators dealing mainly with IT-related...
Read Blog
October 22, 2019

Major security issues that keep your organization’s CISO up all night

Major security issues that keep your organization’s CISO up all night

Estimated reading time: 3 minutes

With multiple ransomware attacks making the headlines, it is essential that the IT heads and concerned CISOs start treating cybersecurity as a mainstream topic. However, it is saddening to see that the sophisticated threats are continually outpacing the growth...
Read Blog
October 25, 2017

Need for Security Expert at Senior Level: CISO

Need for Security Expert at Senior Level: CISO

Estimated reading time: 3 minutes

You might be sitting relaxed in your office thinking that cyber threats are for others. My IT department is sufficient to take care of the security of my data and systems. Or probably, we aren’t that big or popular that...
Read Blog
June 16, 2017

Dealing with Insider Threats: A Brief Guide for CISOs

Dealing with Insider Threats: A Brief Guide for CISOs

Estimated reading time: 3 minutes

Cyber security threats are among the top concerns of an enterprise, with the fear and nervousness fueled by the recent incidents of massive security breaches and ransomware attacks. But what is less well known is that more than half of these security...
Read Blog
June 12, 2017

Traversing the Cyber Threat Terrain in 2024: Insights, Expert Guidance, and Collective Resilience

Traversing the Cyber Threat Terrain in 2024: Insights, Expert Guidance, and Collective Resilience

Estimated reading time: 2 minutes

The year 2023 was eventful, witnessing a myriad of advanced threats targeting prominent economies, including India. Many still remember the fake IRCTC app that stole sensitive user information or the infamous loan apps that devastated many innocent lives. Malware...
Read Blog
February 8, 2024
1 2 … 6 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies