• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Enterprise security Archive

Everything you need to know about the Microsoft Exchange Server Zero-Day Vulnerabilities

Everything you need to know about the Microsoft Exchange Server Zero-Day Vulnerabilities

Estimated reading time: 7 minutes

On March 2, Microsoft announced a threat group, HAFNIUM, is actively exploiting four zero-day vulnerabilities in their Exchange Servers.  Microsoft has released out-of-band security updates (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065), enabling attackers to take access email accounts and run...
Read More
May 18, 2021

Hackers are breaking into the enterprise through content collaboration platforms CCPs

Hackers are breaking into the enterprise through content collaboration platforms CCPs

Estimated reading time: 4 minutes

Globally, as enterprises gather and integrate optimum avenues to secure their information technology infrastructure from cyber threats, somehow, hackers are still managing to find a way to break-in. Cybersecurity vigilance has driven business stakeholders to secure core networks with...
Read More
July 17, 2019

Email could be one of the simplest ways for hackers to breach your organization

Email could be one of the simplest ways for hackers to breach your organization

Estimated reading time: 3 minutes

What is common between Sarah Palin, George HW Bush, and John Podesta? Apart from being important political figures in the United States, there’s another fact that unites them – they’ve all been victims of messy email hacks. Sometimes, danger...
Read More
July 9, 2019

New Product Launch: Seqrite Secure Web Gateway

New Product Launch: Seqrite Secure Web Gateway

Estimated reading time: 3 minutes

More and more organizations are opting for a secure web gateway solution as the next step up from conventional security solutions. Secure web gateways prevent unsecured traffic from entering an organization’s internal network and prevent employees/users from accessing or...
Read More
July 18, 2018
1

Poor network visibility: Don’t put your enterprise’s security at risk

Poor network visibility: Don’t put your enterprise’s security at risk

Estimated reading time: 3 minutes

This is a world that is connected. Whether is the Internet of Things (IoT) or BYOD (Bring Your Own Device), enterprise networks do not exist in silos anymore. The number of devices that connect to enterprise networks is exponentially...
Read More
May 9, 2018
  • 5
    Shares

Top 5 questions SMBs should ask potential service providers

Top 5 questions SMBs should ask potential service providers

Estimated reading time: 3 minutes

SMBs are increasingly evaluating security vendors on the basis of their endpoint encryption services and other related features. While managed security services are mostly outsourced, a better part of an organization’s security posture depends on how the endpoints are...
Read More
March 13, 2018

Remember the security basics as your cybersecurity strategy evolves

Remember the security basics as your cybersecurity strategy evolves

Estimated reading time: 3 minutes

Most cybersecurity strategies thrive on advanced technologies when it comes to mitigating complex threats. In the meanwhile, CISOs and the concerned IT heads tend to ignore the basic precautions and security standards required for preventing data breaches. Although technological...
Read More
November 15, 2017

Why we need to focus on protecting enterprise devices?

Why we need to focus on protecting enterprise devices?

Estimated reading time: 3 minutes

Mobility is a widely-adopted approach that comes as a blessing for organizational growth but builds up as a headache for the IT security pros. While mobility can help enterprises reduce service costs and improve user experience by concentrating more...
Read More
October 23, 2017

Security scorecard: How much does your organization score?

Security scorecard: How much does your organization score?

Estimated reading time: 3 minutes

An organization spends significant amount of money and effort on implementing cybersecurity yet it can be breached. In such situations, how does an organization identify if it had taken enough measures to protect itself before the breach occurred? This is where a security...
Read More
September 21, 2017

Use CAA DNS records for SSL Certificate and minimize cyber threats

Use CAA DNS records for SSL Certificate and minimize cyber threats

Estimated reading time: 3 minutes

SSL or Secure Sockets Layer (commonly referred as HTTPS) has now become a necessity for protecting your websites whether it is handling any sensitive information or not. An organization needs to install SSL certificate, issued by a Certificate Authority...
Read More
September 21, 2017
1 2 Next →
Popular Posts
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • Uncovering LockBit Black’s Attack Chain and Anti-forensic activity Uncovering LockBit Black’s Attack Chain and Anti-forensic activity February 1, 2023
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.