• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cybersecurity

Seqrite Endpoint Encryption Solutions: Key Features

Seqrite Endpoint Encryption Solutions: Key Features

Estimated reading time: 3 minutes

It is becoming increasingly difficult for organizations to handle data complexities, courtesy the expansive proliferation of devices and the associated information sets. Moreover, with hackers opting for tech-intensive intrusion strategies, the number of data breaches encountered on a daily...
Read Blog
March 26, 2018
7
Shares

How ready are you for the evolution of ransomware?

How ready are you for the evolution of ransomware?

Estimated reading time: 3 minutes

Thanks to the widespread coverage that the WannaCry and the Petya attacks received in 2017, ransomware is no longer an unknown or misunderstood terms, especially for those whose work revolves around handling cybersecurity. In fact, ransomware – which basically refers to...
Read Blog
March 23, 2018
13
Shares

Machine learning use cases for security

Machine learning use cases for security

Estimated reading time: 3 minutes

A key buzzword in today’s inter-connected digital landscape is “machine learning”. The concept basically refers to computers learning from data instead of receiving explicit programming. Through such machine learning algorithms, computers are fed huge datasets and parse through them...
Read Blog
March 21, 2018
12
Shares

Prioritizing cybersecurity: Where to start?

Prioritizing cybersecurity: Where to start?

Estimated reading time: 3 minutes

Cybersecurity encompasses a bigger picture and majority of c-suite IT executives are paying close attention to the existing threats and mitigation plans. While some companies are finding it hard to meet the demands related to digital transformation, there are...
Read Blog
March 20, 2018
8
Shares

5 Must Have Features of a Network Security Solution

5 Must Have Features of a Network Security Solution

Estimated reading time: 3 minutes

The changing dynamics of IT with its big data, mobile technologies, Bring Your Own Device (BYOD) and the Internet of Things have put an ever-increasing stress on the network as the threat landscape continues to broaden and advance at...
Read Blog
March 16, 2018
5
Shares

Hackers love organizations of all sizes

Hackers love organizations of all sizes

Estimated reading time: 3 minutes

Hacking is the unauthorized entry into a computer or network with the individuals engaged in these activities referred to as hackers. Hackers alter system or security software and/or hardware of the computer or network to accomplish a goal that...
Read Blog
March 15, 2018
14
Shares

Found new vulnerabilities: What’s next?

Found new vulnerabilities: What’s next?

Estimated reading time: 2 minutes

A big headache which all network administrators have is the vulnerability status of their business. With more and more business being conducted online, every organization has an online presence and network. Popular software attracts the attention of malicious criminals...
Read Blog
March 14, 2018
6
Shares

Top 5 questions SMBs should ask potential service providers

Top 5 questions SMBs should ask potential service providers

Estimated reading time: 3 minutes

SMBs are increasingly evaluating security vendors on the basis of their endpoint encryption services and other related features. While managed security services are mostly outsourced, a better part of an organization’s security posture depends on how the endpoints are...
Read Blog
March 13, 2018

Anonymous Cryptocurrency: Introduction to new security challenges

Anonymous Cryptocurrency: Introduction to new security challenges

Estimated reading time: 3 minutes

While the existing crypto-sphere is already plagued by issues concerning scalability, financial privacy is fast shaping us yet another prerequisite to sizeable investments. Individuals are constantly emphasizing on anonymous cryptocurrencies courtesy the flexibilities on offer. That said, we believe...
Read Blog
March 12, 2018

How to manage patches in mixed OS environments

How to manage patches in mixed OS environments

Estimated reading time: 3 minutes

The importance of patch management in today’s cybersecurity environment cannot be understated by organizations today. The world of cyber threats is a rapidly evolving and dynamic one. Hackers are hard at work at every hour and at every minute...
Read Blog
March 9, 2018
← Previous 1 … 17 18 19 … 32 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies