• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: data protection

Why Data Principal Rights Management is the Heart of Modern Privacy Compliance

Why Data Principal Rights Management is the Heart of Modern Privacy Compliance

Estimated reading time: 3 minutes

As data privacy laws evolve globally—from the GDPR to India’s Digital Personal Data Protection Act (DPDPA)—one common theme emerges: empowering individuals with control over their data. This shift places data principal rights at the center of privacy compliance. Respecting...
Read Blog
June 27, 2025

What is MDM and Why Your Business Can’t Ignore It Anymore

What is MDM and Why Your Business Can’t Ignore It Anymore

Estimated reading time: 2 minutes

In today’s always-connected, mobile-first world, employees are working on the go—from airports, cafes, living rooms, and everywhere in between. That’s great for flexibility and productivity—but what about security? How do you protect sensitive business data when it’s spread across...
Read Blog
June 25, 2025

Mastering Cloud Securty: Overcome the Top Challenges with Seqrite

Mastering Cloud Securty: Overcome the Top Challenges with Seqrite

Estimated reading time: 2 minutes

In today’s world, organizations are rapidly embracing cloud security to safeguard their data and operations. However, as cloud adoption grows, so do the risks. In this post, we highlight the top cloud security challenges and show how Seqrite can...
Read Blog
June 24, 2025

How Seqrite Endpoint Protection Blocks Non-Human Threats like Bots, Scripts, and Malware

How Seqrite Endpoint Protection Blocks Non-Human Threats like Bots, Scripts, and Malware

Estimated reading time: 4 minutes

How Seqrite Endpoint Protection Blocks Non-Human Threats like Bots, Scripts, and Malware In today’s hyper-connected digital world, the cybersecurity landscape is shifting dramatically. Gone are the days when cyberattacks primarily relied on human intervention. We’re now facing a new...
Read Blog
June 9, 2025

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

Estimated reading time: 3 minutes

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite Ransomware continues to evolve as one of the most devastating cybersecurity threats, and attackers are finding new ways to exploit vulnerabilities. One such method involves targeting publicly...
Read Blog
March 11, 2025

How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

Estimated reading time: 3 minutes

How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons Introduction The ransomware landscape is evolving rapidly, with attackers constantly refining their techniques to outwit security defenses. One alarming trend is the weaponization of trusted tools like Microsoft’s BitLocker....
Read Blog
March 11, 2025

The ROI of Implementing a ZTNA solution

The ROI of Implementing a ZTNA solution

Estimated reading time: 3 minutes

In today’s digital landscape, where cyber threats are evolving rapidly, organizations must rethink their approach to network security. Traditional security models, such as VPNs and perimeter-based defenses, are no longer sufficient to protect against sophisticated cyberattacks. This is where...
Read Blog
February 24, 2025

Seqrite UTM : Security Weapon Against Man In The Middle Attacks

Seqrite UTM : Security Weapon Against Man In The Middle Attacks

Estimated reading time: 6 minutes

As implied in the name itself, Man In The Middle Attack is a type of attack where a illegal person tries to intercept the communication between two parties. Either to secretly overhear or to steal the critical data being...
Read Blog
December 3, 2019

GDPR has arrived: Check your preparedness

GDPR has arrived: Check your preparedness

Estimated reading time: 3 minutes

25th May 2018, the day has arrived when the EU’s General Data Protection Regulation (GDPR) has come into effect. The GDPR, a high-profile and wide-ranging piece of legislation which will, no doubt, completely reshape the world of cybersecurity and data privacy. Passed by the...
Read Blog
May 25, 2018
6
Shares

State-sponsored cyber attacks: New-age warfare

State-sponsored cyber attacks: New-age warfare

Estimated reading time: 3 minutes

The latest form that war between two countries has taken is cyber attacks. Simply put, a cyber attack is a deliberate exploitation of computer systems, technology-dependent enterprises and networks. While, no clear definition of cyber attack has yet been...
Read Blog
February 27, 2018
16
Shares
1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies