• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: CISO

The burning issue of building a cybersecurity framework

The burning issue of building a cybersecurity framework

Estimated reading time: 2 minutes

Strategic planning and performance reviews have always been an important component for the c-suite and members of the board. Adding on to their responsibilities, now, cybersecurity has also become an essential part of the conversation that enterprise stakeholders have,...
Read Blog
December 3, 2019

Crucial aspects CISOs should look at while building a businesses’ cybersecurity roadmap

Crucial aspects CISOs should look at while building a businesses’ cybersecurity roadmap

Estimated reading time: 3 minutes

Cybersecurity has had a heightened impact in 2019, made visible by the growing responsibilities of the Chief Information Security Officer (CISO). A decade back, cybersecurity was a function looked at by Chief Information Officers and IT teams. However, cybersecurity...
Read Blog
November 27, 2019

Is a chief cybersecurity officer critical for the enterprise?

Is a chief cybersecurity officer critical for the enterprise?

Estimated reading time: 3 minutes

In 2015, the Government of India established a first of sorts – they created a chief cybersecurity officer position under the Prime Minister’s Office. Dr Gulshan Rai became the special secretary for cybersecurity and after serving four years in...
Read Blog
November 20, 2019

How can CISOs defend businesses from supply chain attacks?

How can CISOs defend businesses from supply chain attacks?

Estimated reading time: 3 minutes

A supply chain is an omnipresent and inseparable element in every business, irrespective of its size.  Hence, when it comes to cybersecurity specific to this aspect, simply protecting an enterprise’s periphery isn’t enough. Supply chains consist of people, logistics,...
Read Blog
November 18, 2019

Top five cybersecurity challenges for the CISO

Top five cybersecurity challenges for the CISO

Estimated reading time: 3 minutes

Thanks to increasing cyberthreats, the role of the Chief Information Security Officer (CISO) in an organization is only expanding. More and more CISOs are now part of senior leadership teams, reporting directly to the Chief Executive Officer. There is...
Read Blog
November 14, 2019

Why do boards need to empower their CISO?

Why do boards need to empower their CISO?

Estimated reading time: 2 minutes

A generation ago, the Chief Information Security Officer (CISO) role rarely existed in enterprises and even if it did, it only existed in large to very large organizations. Even here CISOs were mostly system administrators dealing mainly with IT-related...
Read Blog
October 22, 2019

Major security issues that keep your organization’s CISO up all night

Major security issues that keep your organization’s CISO up all night

Estimated reading time: 3 minutes

With multiple ransomware attacks making the headlines, it is essential that the IT heads and concerned CISOs start treating cybersecurity as a mainstream topic. However, it is saddening to see that the sophisticated threats are continually outpacing the growth...
Read Blog
October 25, 2017

Need for Security Expert at Senior Level: CISO

Need for Security Expert at Senior Level: CISO

Estimated reading time: 3 minutes

You might be sitting relaxed in your office thinking that cyber threats are for others. My IT department is sufficient to take care of the security of my data and systems. Or probably, we aren’t that big or popular that...
Read Blog
June 16, 2017
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies