• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cybersecurity

What is Network Forensics and how does it help cybersecurity professionals?

What is Network Forensics and how does it help cybersecurity professionals?

Estimated reading time: 2 minutes

Network forensics refers to a branch of digital forensics, chiefly involved with the collection and analysis of network traffic for the purpose of understanding evidence about cybercrimes for preventing it. A report from the European Union Agency for Cybersecurity...
Read Blog
December 17, 2019

Anti-Ransomware software is not a data backup solution!

Anti-Ransomware software is not a data backup solution!

Estimated reading time: 2 minutes

Over 30,000 customers across the globe rely on Seqrite’s cutting-edge Anti-Ransomware capabilities to protect businesses from being taken as hostages by hackers. Quick Heal, the parent company of enterprise cybersecurity brand Seqrite, had predicted ransomware to be the menace...
Read Blog
December 13, 2019

Enterprise security in the age of nation-state cybersecurity threats

Enterprise security in the age of nation-state cybersecurity threats

Estimated reading time: 2 minutes

The digital modern battlefield has proven time-and-again that cyberattacks, just like tanks and guns, are one of the biggest weapons that a country possesses to wage a war. All over the world, nation-states are surreptitiously or, in some cases,...
Read Blog
December 12, 2019

How can the CISO tackle the challenge of talent shortage?

How can the CISO tackle the challenge of talent shortage?

Estimated reading time: 3 minutes

Year-after-year, apart from malware, the cybersecurity industry continues to face the major threat of finding skilled professionals. It’s a crisis that has been validated by concerning numbers from different sources — a report in 2018 by the International Information...
Read Blog
December 11, 2019

Mitigating cyber threats through Better data protection

Mitigating cyber threats through Better data protection

Estimated reading time: 2 minutes

In September 2019, a massive data breach impacted an estimated 20 million people in the South American country of Ecuador. The population of Ecuador itself is 17 million which meant almost the entire population was at risk due to...
Read Blog
December 9, 2019

Will Automation be the next big weapon against cyber threats?

Will Automation be the next big weapon against cyber threats?

Estimated reading time: 2 minutes

The Ponemon Institute recently completed a survey on ‘Staffing the IT Security Function In the Age of Automation’ in an attempt to understand the effect of automation on IT security. 49 % of respondents to this survey felt that...
Read Blog
December 5, 2019

Leveraging security analytics to bolster enterprise cybersecurity

Leveraging security analytics to bolster enterprise cybersecurity

Estimated reading time: 2 minutes

Without data, you’re just another person with an opinion” – W. Edwards Deming Widely used across different industries, security analytics is slowly making its way into the domain of cybersecurity — courtesy to this industry’s rising awareness about the...
Read Blog
December 4, 2019

The burning issue of building a cybersecurity framework

The burning issue of building a cybersecurity framework

Estimated reading time: 2 minutes

Strategic planning and performance reviews have always been an important component for the c-suite and members of the board. Adding on to their responsibilities, now, cybersecurity has also become an essential part of the conversation that enterprise stakeholders have,...
Read Blog
December 3, 2019

Crucial aspects CISOs should look at while building a businesses’ cybersecurity roadmap

Crucial aspects CISOs should look at while building a businesses’ cybersecurity roadmap

Estimated reading time: 3 minutes

Cybersecurity has had a heightened impact in 2019, made visible by the growing responsibilities of the Chief Information Security Officer (CISO). A decade back, cybersecurity was a function looked at by Chief Information Officers and IT teams. However, cybersecurity...
Read Blog
November 27, 2019

What kind of hackers exists in the cybersecurity world?

What kind of hackers exists in the cybersecurity world?

Estimated reading time: 2 minutes

Hackers, by definition, are skilled computer experts that have the ability to overcome technological problems. Thanks to the wide representation of hackers in books, movies and other popular culture,  a large number of people have a fair idea of...
Read Blog
November 26, 2019
← Previous 1 … 11 12 13 … 33 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies