• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

data security Archive

Machine learning use cases for security

Machine learning use cases for security

Estimated reading time: 3 minutes

A key buzzword in today’s inter-connected digital landscape is “machine learning”. The concept basically refers to computers learning from data instead of receiving explicit programming. Through such machine learning algorithms, computers are fed huge datasets and parse through them...
Read More
March 21, 2018
  • 12
    Shares

Minimize Cybersecurity Risk with IT Asset Management

Minimize Cybersecurity Risk with IT Asset Management

Estimated reading time: 3 minutes

Cybersecurity has evolved as one of the top organizational areas of concern for both government organizations and commercial setups. Not a day goes by when we don’t come across organizations leveraging IT Asset Management in the form of a...
Read More
February 23, 2018

Data Security: Where are the SMBs failing in securing their data

Data Security: Where are the SMBs failing in securing their data

Estimated reading time: 3 minutes

Small and medium sized businesses usually rely on organizational data for flourishing and succeeding in their endeavors. However, there are chances that the SMBs are putting all their data at risk by implementing erroneous strategies.  According to the latest...
Read More
February 9, 2018
  • 12
    Shares

Become a leader in creating cyber trust with Seqrite Endpoint Security

Become a leader in creating cyber trust with Seqrite Endpoint Security

Estimated reading time: 3 minutes

Enterprises, big and small, all over the world, are waking up to the importance of garnering cyber trust. In a digital age where technology only breaches new frontiers, cyber trust has become a key differentiator. Security breaches are not...
Read More
January 24, 2018
  • 17
    Shares

Endpoint Security: Things to consider before choosing the right one

Endpoint Security: Things to consider before choosing the right one

Estimated reading time: 3 minutes

The term endpoint security refers to protecting endpoints such as desktops and laptops connected to the enterprise network. Endpoint security happens to be the front line in the battle against cyber-attacks because every device that connects to a corporate network...
Read More
January 18, 2018

7 Major causes of data breaches

7 Major causes of data breaches

Estimated reading time: 3 minutes

The growing threat of data breaches globally has kept businesses on their toes. They occur when important proprietary, sensitive or confidential information is accessed or disclosed in an unauthorized faction. Data breaches can have a deep-lasting effect on a...
Read More
January 8, 2018
  • 4
    Shares

Pillars of enterprise data protection: A proactive approach

Pillars of enterprise data protection: A proactive approach

Estimated reading time: 3 minutes

Modern day data security and protection requirements aren’t only about integrity, confidentiality, and availability. Instead, security professionals must take a proactive approach for improving business value and addressing organizational security. However, talking about proactivity isn’t going to make much...
Read More
November 27, 2017

Healthcare: Cybersecurity risks with vendors

Healthcare: Cybersecurity risks with vendors

Estimated reading time: 3 minutes

There has been a surge in cyber attacks in the healthcare industry. Ransomware attacks have increased across all sectors, but healthcare industry is particularly vulnerable to such attacks. Getting locked out of systems while handling critical patient data or operational...
Read More
September 6, 2017

Dangers of hackers breaking into your printer

Dangers of hackers breaking into your printer

Estimated reading time: 3 minutes

Do you think that printers can’t be hacked as there is really nothing to hack in there? You might be completely wrong! Printers have been a favorite target of hackers for a while now. They are routinely compromised, whether they are setup at...
Read More
August 4, 2017

Seqrite Data Loss Prevention (DLP) -A Multi-Layered Approach to Data Security

Seqrite Data Loss Prevention (DLP) -A Multi-Layered Approach to Data Security

Estimated reading time: 3 minutes

An increasing volume of business information assets are distributed digitally today and has been growing exponentially every year. Confidential and sensitive business information is no longer restricted to physical boundaries of business enterprises. With the implementation of policies like...
Read More
August 1, 2017
2
1 2 Next →
Popular Posts
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • Uncovering LockBit Black’s Attack Chain and Anti-forensic activity Uncovering LockBit Black’s Attack Chain and Anti-forensic activity February 1, 2023
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.