• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cybersecurity

Prioritizing Data Security Investments through a Data Security Governance Framework (DSGF)

Prioritizing Data Security Investments through a Data Security Governance Framework (DSGF)

Estimated reading time: 2 minutes

A shift to prioritize data security investments through a Data Security Governance Framework (DSGF) was among the top seven security and risk management trends identified by global research & advisory firm Gartner in 2019. Breaking it down, the report...
Read Blog
October 14, 2019

What is the kill chain and the seven steps involved in it?

What is the kill chain and the seven steps involved in it?

Estimated reading time: 2 minutes

The term ‘kill chain’ originated in the military as a concept to outline and define each stage of an attack. It has found its way into cybersecurity as well as a means to understand the structure of a cyber...
Read Blog
October 11, 2019

2020: A new paradigm in Cybersecurity

2020: A new paradigm in Cybersecurity

Estimated reading time: 3 minutes

As we enter a new decade, it is important to look back and learn from the decade that is about to end. From 2010 to 2019, cybersecurity moved at a furious pace. Threats erupted in multiple new vectors, spreading...
Read Blog
October 7, 2019

Effective methods for enterprises to detect and prevent network intrusions

Effective methods for enterprises to detect and prevent network intrusions

Estimated reading time: 2 minutes

Enterprise networks are susceptible to brutal intrusions – some of these intrusions could be in the form of systems on the network running unauthorized applications with vulnerabilities and backdoors. When such vulnerabilities are exploited, unsolicited access to the network...
Read Blog
October 4, 2019

Five questions every CEO should be asking about cybersecurity

Five questions every CEO should be asking about cybersecurity

Estimated reading time: 3 minutes

As the captain of the ship, the Chief Executive Officer (CEO) plays a very important role in how an enterprise addresses cybersecurity issues and concerns. When the CEO provides a buy-in towards making enterprise security safer, it trickles down...
Read Blog
October 1, 2019

Investing in Enterprise security is a necessity, not a luxury

Investing in Enterprise security is a necessity, not a luxury

Estimated reading time: 3 minutes

In the current ‘digital-first’ environment that organizations and businesses operate nowadays, success and failure can often depend on enterprise security solutions. Businesses operate in an environment where the threats from the digital sphere can often outweigh the threats from...
Read Blog
September 25, 2019

Cybersecurity to be the biggest threat to the enterprise for the next decade

Cybersecurity to be the biggest threat to the enterprise for the next decade

Estimated reading time: 3 minutes

Ernst & Young (EY) conducted a CEO imperative survey and gathered exclusive insights from 200 global CEOs and some of Forbes’ largest private players about what they thought will be the biggest problem for businesses in the coming years?...
Read Blog
September 5, 2019

The Information Technology industry’s major cybersecurity challenges

The Information Technology  industry’s major cybersecurity challenges

Estimated reading time: 3 minutes

The Information Technology (IT) sector has snowballed into an extremely profitable and revenue-generating entity in a relatively small amount of time. IT is single-handedly responsible to initiate and implement digitalization ensuring that a very large amount of information gets...
Read Blog
September 3, 2019

The retail industry’s major cybersecurity challenges

The retail industry’s major cybersecurity challenges

Estimated reading time: 3 minutes

The retail sector has always been at the risk of cyberattacks. The industry has already seen high-profile data breaches, some of which have happened in the recent past at large retail brands, lucrative to cyberattackers, such as Target, TJX...
Read Blog
August 27, 2019

The transformation of enterprise security from 2017 to 2019

The transformation of enterprise security from 2017 to 2019

Estimated reading time: 2 minutes

The nature of enterprise security is such that it continuously keeps evolving. Trends change, threats vary and morph into different entities, approaches that seem relevant get outdated in six months or sometimes even lesser. For enterprises looking to stay...
Read Blog
August 22, 2019
← Previous 1 … 15 16 17 … 34 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (331) cyber security (34) Cyber threat (33) cyber threats (49) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) mobile device management (11) Network security (23) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (36) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies