• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Data Archive

The Data breach inferno burning big-ticket businesses

The Data breach inferno burning big-ticket businesses

Estimated reading time: 2 minutes

The recent surge of data breaches in different Indian companies has left security stakeholders worried. It is a clear indicator that enterprises will have to do much more to ensure they keep sensitive customer data safe. Perhaps, the most...
Read More
February 5, 2021

Attacks on the defence sector could prove very costly!

Attacks on the defence sector could prove very costly!

Estimated reading time: 2 minutes

In the current modern era of information warfare, securing military assets has become strategically very important. Recently, Seqrite reported on Operation ‘Honey Trap’, an operation launched by a Pakistan-linked threat actor allegedly, which targeted employees from Indian defence organizations....
Read More
October 16, 2020

Did you know that adversaries are planning to steal your data?

Did you know that adversaries are planning to steal your data?

Estimated reading time: 2 minutes

How valuable is data? A good way to answer that question is to look at the average cost of a data breach. Recent research in May 2020 found that the average cost of a data breach was USD 3.92...
Read More
September 11, 2020

Managing cybersecurity in multimedia networks

Managing cybersecurity in multimedia networks

Estimated reading time: 2 minutes

The explosion of internet speeds across the globe has led to a rapid increase in high-end streaming technology, wireless sensor networks and wearable Internet of Things (IoT) devices. Multimedia networks generate huge amounts of data flowing through multiple devices...
Read More
December 30, 2019

How can blockchain enable better data security for enterprises?

How can blockchain enable better data security for enterprises?

Estimated reading time: 2 minutes

NASA recently announced a proposal to explore the possibility of using blockchain to improve the cybersecurity of its current air traffic management systems. It was a powerful statement from one of the world’s most well-known organizations and a strong...
Read More
December 27, 2019

Anti-Ransomware software is not a data backup solution!

Anti-Ransomware software is not a data backup solution!

Estimated reading time: 2 minutes

Over 30,000 customers across the globe rely on Seqrite’s cutting-edge Anti-Ransomware capabilities to protect businesses from being taken as hostages by hackers. Quick Heal, the parent company of enterprise cybersecurity brand Seqrite, had predicted ransomware to be the menace...
Read More
December 13, 2019

Mitigating cyber threats through Better data protection

Mitigating cyber threats through Better data protection

Estimated reading time: 2 minutes

In September 2019, a massive data breach impacted an estimated 20 million people in the South American country of Ecuador. The population of Ecuador itself is 17 million which meant almost the entire population was at risk due to...
Read More
December 9, 2019

Crucial aspects CISOs should look at while building a businesses’ cybersecurity roadmap

Crucial aspects CISOs should look at while building a businesses’ cybersecurity roadmap

Estimated reading time: 3 minutes

Cybersecurity has had a heightened impact in 2019, made visible by the growing responsibilities of the Chief Information Security Officer (CISO). A decade back, cybersecurity was a function looked at by Chief Information Officers and IT teams. However, cybersecurity...
Read More
November 27, 2019

The importance of cybersecurity for satellite communications

The importance of cybersecurity for satellite communications

Estimated reading time: 3 minutes

A  major part of human communications today is dependent on satellites. More so,  global navigation systems, military strategies, information collection, environment research, and even the internet are all dependent on the smooth functioning and continuous integration with these valuable...
Read More
November 8, 2019

The Information Technology industry’s major cybersecurity challenges

The Information Technology  industry’s major cybersecurity challenges

Estimated reading time: 3 minutes

The Information Technology (IT) sector has snowballed into an extremely profitable and revenue-generating entity in a relatively small amount of time. IT is single-handedly responsible to initiate and implement digitalization ensuring that a very large amount of information gets...
Read More
September 3, 2019
1 2 Next →
Popular Posts
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • Uncovering LockBit Black’s Attack Chain and Anti-forensic activity Uncovering LockBit Black’s Attack Chain and Anti-forensic activity February 1, 2023
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.