• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cybersecurity

Staging a fake attack can help you evaluate your cybersecurity preparedness

Staging a fake attack can help you evaluate your cybersecurity preparedness

Estimated reading time: 3 minutes

Organizations of all hues and shades nowadays invest a lot in cybersecurity and rightly so. The world is moving from just being digital to being hyperconnected and now an organization’s most confidential information could be on the cloud. Hence,...
Read Blog
March 29, 2018
3
Shares

Executive Insights: Stopping cyber-attacks starts with IT Security Pros

Executive Insights: Stopping cyber-attacks starts with IT Security Pros

Estimated reading time: 3 minutes

PwC’s 2018 Global Economic Crime and Fraud Survey found that 49% of global organizations say they’ve experienced economic crime in the past two years. So would it mean that the remaining 51% have been protected against any such attacks...
Read Blog
March 28, 2018
4
Shares

Seqrite Endpoint Encryption Solutions: Key Features

Seqrite Endpoint Encryption Solutions: Key Features

Estimated reading time: 3 minutes

It is becoming increasingly difficult for organizations to handle data complexities, courtesy the expansive proliferation of devices and the associated information sets. Moreover, with hackers opting for tech-intensive intrusion strategies, the number of data breaches encountered on a daily...
Read Blog
March 26, 2018
7
Shares

How ready are you for the evolution of ransomware?

How ready are you for the evolution of ransomware?

Estimated reading time: 3 minutes

Thanks to the widespread coverage that the WannaCry and the Petya attacks received in 2017, ransomware is no longer an unknown or misunderstood terms, especially for those whose work revolves around handling cybersecurity. In fact, ransomware – which basically refers to...
Read Blog
March 23, 2018
13
Shares

Machine learning use cases for security

Machine learning use cases for security

Estimated reading time: 3 minutes

A key buzzword in today’s inter-connected digital landscape is “machine learning”. The concept basically refers to computers learning from data instead of receiving explicit programming. Through such machine learning algorithms, computers are fed huge datasets and parse through them...
Read Blog
March 21, 2018
12
Shares

Prioritizing cybersecurity: Where to start?

Prioritizing cybersecurity: Where to start?

Estimated reading time: 3 minutes

Cybersecurity encompasses a bigger picture and majority of c-suite IT executives are paying close attention to the existing threats and mitigation plans. While some companies are finding it hard to meet the demands related to digital transformation, there are...
Read Blog
March 20, 2018
8
Shares

5 Must Have Features of a Network Security Solution

5 Must Have Features of a Network Security Solution

Estimated reading time: 3 minutes

The changing dynamics of IT with its big data, mobile technologies, Bring Your Own Device (BYOD) and the Internet of Things have put an ever-increasing stress on the network as the threat landscape continues to broaden and advance at...
Read Blog
March 16, 2018
5
Shares

Hackers love organizations of all sizes

Hackers love organizations of all sizes

Estimated reading time: 3 minutes

Hacking is the unauthorized entry into a computer or network with the individuals engaged in these activities referred to as hackers. Hackers alter system or security software and/or hardware of the computer or network to accomplish a goal that...
Read Blog
March 15, 2018
14
Shares

Found new vulnerabilities: What’s next?

Found new vulnerabilities: What’s next?

Estimated reading time: 2 minutes

A big headache which all network administrators have is the vulnerability status of their business. With more and more business being conducted online, every organization has an online presence and network. Popular software attracts the attention of malicious criminals...
Read Blog
March 14, 2018
6
Shares

Top 5 questions SMBs should ask potential service providers

Top 5 questions SMBs should ask potential service providers

Estimated reading time: 3 minutes

SMBs are increasingly evaluating security vendors on the basis of their endpoint encryption services and other related features. While managed security services are mostly outsourced, a better part of an organization’s security posture depends on how the endpoints are...
Read Blog
March 13, 2018
← Previous 1 … 18 19 20 … 34 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (331) cyber security (34) Cyber threat (33) cyber threats (49) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) mobile device management (11) Network security (23) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (36) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies