• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

data protection Archive

Seqrite UTM : Security Weapon Against Man In The Middle Attacks

Seqrite UTM : Security Weapon Against Man In The Middle Attacks

Estimated reading time: 6 minutes

As implied in the name itself, Man In The Middle Attack is a type of attack where a illegal person tries to intercept the communication between two parties. Either to secretly overhear or to steal the critical data being...
Read More
December 3, 2019

GDPR has arrived: Check your preparedness

GDPR has arrived: Check your preparedness

Estimated reading time: 3 minutes

25th May 2018, the day has arrived when the EU’s General Data Protection Regulation (GDPR) has come into effect. The GDPR, a high-profile and wide-ranging piece of legislation which will, no doubt, completely reshape the world of cybersecurity and data privacy. Passed by the...
Read More
May 25, 2018
  • 6
    Shares

State-sponsored cyber attacks: New-age warfare

State-sponsored cyber attacks: New-age warfare

Estimated reading time: 3 minutes

The latest form that war between two countries has taken is cyber attacks. Simply put, a cyber attack is a deliberate exploitation of computer systems, technology-dependent enterprises and networks. While, no clear definition of cyber attack has yet been...
Read More
February 27, 2018
  • 16
    Shares

Will GDPR impact your business?

Will GDPR impact your business?

Estimated reading time: 3 minutes

May, 25, 2018. Mark the date. This is when the much-discussed General Data Protection Regulation (GDPR) will come into effect. A significant, wide-ranging piece of legislation which will, no doubt, have a major effect on the world of cybersecurity...
Read More
February 22, 2018
  • 17
    Shares

Asset Management: Protecting your company’s most important assets

Asset Management: Protecting your company’s most important assets

Estimated reading time: 3 minutes

A comprehensive IT Asset Management (ITAM) program facilitates an accurate, documented IT environment covering the organization’s assets and data along with their owners and highlighting security and risks across the network. It helps to make critical decisions regarding software...
Read More
January 29, 2018
  • 8
    Shares

Why you need advanced information security technologies?

Why you need advanced information security technologies?

Estimated reading time: 3 minutes

Cybersecurity threats have evolved over the years, compelling industries to focus on advanced technologies that are in line with the innovative threat vectors. That said, enterprises are committed towards improving the security posture of their IT systems and in...
Read More
November 28, 2017

Pillars of enterprise data protection: A proactive approach

Pillars of enterprise data protection: A proactive approach

Estimated reading time: 3 minutes

Modern day data security and protection requirements aren’t only about integrity, confidentiality, and availability. Instead, security professionals must take a proactive approach for improving business value and addressing organizational security. However, talking about proactivity isn’t going to make much...
Read More
November 27, 2017

Gateway protection: Next-Gen security solution

Gateway protection: Next-Gen security solution

Estimated reading time: 3 minutes

Cyberworld has become a jungle full of dangerous beasts. There are so many threats out there that it requires a large and dedicated set of professionals with state of the art equipment to protect the organization against all of...
Read More
September 29, 2017

Encryption: Improve information security by turning it into codes

Encryption: Improve information security by turning it into codes

Estimated reading time: 3 minutes

Today the economy is all about data. All  the business financial information, customer information, Intellectual property information, and all other information about the business is stored in digital format. All this information is data. In a pre-digital era, the data was in physical...
Read More
September 28, 2017

What are software and zero-day vulnerabilities?

What are software and zero-day vulnerabilities?

Estimated reading time: 3 minutes

Software developers ensure that there are no security gaps when they release a new version of their software, be it an application or an operating system or any other kind of software. However, it is impossible to design a...
Read More
September 27, 2017
1 2 3 Next →
Popular Posts
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • Artificial Intelligence – its use and misuse Artificial Intelligence – its use and misuse February 4, 2019
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.