• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cybersecurity

Mitigating cyber threats through Better data protection

Mitigating cyber threats through Better data protection

Estimated reading time: 2 minutes

In September 2019, a massive data breach impacted an estimated 20 million people in the South American country of Ecuador. The population of Ecuador itself is 17 million which meant almost the entire population was at risk due to...
Read Blog
December 9, 2019

Will Automation be the next big weapon against cyber threats?

Will Automation be the next big weapon against cyber threats?

Estimated reading time: 2 minutes

The Ponemon Institute recently completed a survey on ‘Staffing the IT Security Function In the Age of Automation’ in an attempt to understand the effect of automation on IT security. 49 % of respondents to this survey felt that...
Read Blog
December 5, 2019

Leveraging security analytics to bolster enterprise cybersecurity

Leveraging security analytics to bolster enterprise cybersecurity

Estimated reading time: 2 minutes

Without data, you’re just another person with an opinion” – W. Edwards Deming Widely used across different industries, security analytics is slowly making its way into the domain of cybersecurity — courtesy to this industry’s rising awareness about the...
Read Blog
December 4, 2019

The burning issue of building a cybersecurity framework

The burning issue of building a cybersecurity framework

Estimated reading time: 2 minutes

Strategic planning and performance reviews have always been an important component for the c-suite and members of the board. Adding on to their responsibilities, now, cybersecurity has also become an essential part of the conversation that enterprise stakeholders have,...
Read Blog
December 3, 2019

Crucial aspects CISOs should look at while building a businesses’ cybersecurity roadmap

Crucial aspects CISOs should look at while building a businesses’ cybersecurity roadmap

Estimated reading time: 3 minutes

Cybersecurity has had a heightened impact in 2019, made visible by the growing responsibilities of the Chief Information Security Officer (CISO). A decade back, cybersecurity was a function looked at by Chief Information Officers and IT teams. However, cybersecurity...
Read Blog
November 27, 2019

What kind of hackers exists in the cybersecurity world?

What kind of hackers exists in the cybersecurity world?

Estimated reading time: 2 minutes

Hackers, by definition, are skilled computer experts that have the ability to overcome technological problems. Thanks to the wide representation of hackers in books, movies and other popular culture,  a large number of people have a fair idea of...
Read Blog
November 26, 2019

Preventing malware from spreading with Seqrite Endpoint Security

Preventing malware from spreading with Seqrite Endpoint Security

Estimated reading time: 2 minutes

The spread of computer malware can be devastatingly fast — a cursory look at some of the top computer malware in the age of modern history shows the speed at which they replicate and the damage they cause. From...
Read Blog
November 25, 2019

Pegasus like spyware could be snooping on you right now!!

Pegasus like spyware could be snooping on you right now!!

Estimated reading time: 4 minutes

The recent news of Pegasus spyware attack via WhatsApp that targeted lawyers, journalists and human rights activists, offers an astonishing revelation on the kind of havoc such spyware can create. We covered the topic extensively, recently. The frequent media...
Read Blog
November 22, 2019

Why should enterprise directors get cybersecurity experts on board?

Why should enterprise directors get cybersecurity experts on board?

Estimated reading time: 2 minutes

The board of directors provide good governance and build a strategy for the enterprise. The successful running and well-being of a business often depend on the vision and direction provided by a competent board as they decide and execute...
Read Blog
November 21, 2019

Is a chief cybersecurity officer critical for the enterprise?

Is a chief cybersecurity officer critical for the enterprise?

Estimated reading time: 3 minutes

In 2015, the Government of India established a first of sorts – they created a chief cybersecurity officer position under the Prime Minister’s Office. Dr Gulshan Rai became the special secretary for cybersecurity and after serving four years in...
Read Blog
November 20, 2019
← Previous 1 … 12 13 14 … 33 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (14) Cybersecurity (328) cyber security (34) Cyber threat (33) cyber threats (48) data breach (56) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (17) Exploit (14) firewall (11) GDPR (13) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (29) Ransomware (68) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (36) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies