• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: security

Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics

Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics

Estimated reading time: 8 minutes

Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics Contents Introduction Infection Chain Initial Findings Campaign 1 Looking into PDF document. Campaign 2 Looking into PDF document. Technical Analysis Campaign 1 & 2 Conclusion Seqrite Protection MITRE ATT&CK...
Read Blog
April 4, 2025

Introducing Seqrite HawkkEye – A Centralized Security Solution For The Digital Age

Introducing Seqrite HawkkEye – A Centralized Security Solution For The Digital Age

Estimated reading time: 2 minutes

The evolution of the Work From Anywhere model has led to a highly distributed workforce with a proliferation of devices that are both BYOD and corporate-owned. This proliferation has resulted in an expansion of an enterprise’s attack surface, due...
Read Blog
June 25, 2021

Seqrite Endpoint Security Supports Windows 10 May 2021 Update 21H1

Seqrite Endpoint Security Supports Windows 10 May 2021 Update 21H1

Estimated reading time: < 1 minute

Microsoft has recently come up with a new update for Windows 10 PCs, called Windows 10 May 2021 Update (version 21H1). This post lists some of the highlights of this update and sees how Seqrite Endpoint Security is compatible...
Read Blog
May 19, 2021

Why ensuring employees with cyber hygiene is important for all organizations?

Why ensuring employees with cyber hygiene is important for all organizations?

Estimated reading time: 2 minutes

Current times have witnessed a large percentage of cyber breaches resulting from human errors. For example, the famous WannaCry ransomware attack that affected the entire world in 2017 increased due to negligence of security teams in ensuring  if the...
Read Blog
May 12, 2021

Leveraging security analytics to bolster enterprise cybersecurity

Leveraging security analytics to bolster enterprise cybersecurity

Estimated reading time: 2 minutes

Without data, you’re just another person with an opinion” – W. Edwards Deming Widely used across different industries, security analytics is slowly making its way into the domain of cybersecurity — courtesy to this industry’s rising awareness about the...
Read Blog
December 4, 2019

Renewed interests in excelling Security Operation Centres?

Renewed interests in excelling Security Operation Centres?

Estimated reading time: 2 minutes

According to Gartner’s Top 7 Security and Risk Trends 2019 report, a renewed interest towards excelling Security Operation Centres (SOCs) has been considered as among the top two new trends of the year. The evolution of the Security Operations...
Read Blog
November 1, 2019

What are some of the worst enterprise security habits?

What are some of the worst enterprise security habits?

Estimated reading time: 3 minutes

Enterprise security is a habit! Good habits take years to form – bad habits, on the other hand, take only seconds, and can bring years of hard work taken down in minutes. The same rule applies to enterprise security...
Read Blog
July 26, 2019

The Cyber Threat Landscape 2017

The Cyber Threat Landscape 2017

Estimated reading time: 3 minutes

Cyber threats are multiplying at an uncontrollable rate and 2017 hasn’t been any different. While global damages, concerning cybersecurity, are expected to surpass $5 billion by the end of this year, the actual predicament is the supposed yearly growth which...
Read Blog
December 4, 2017
2
Shares

Pillars of enterprise data protection: A proactive approach

Pillars of enterprise data protection: A proactive approach

Estimated reading time: 3 minutes

Modern day data security and protection requirements aren’t only about integrity, confidentiality, and availability. Instead, security professionals must take a proactive approach for improving business value and addressing organizational security. However, talking about proactivity isn’t going to make much...
Read Blog
November 27, 2017

Why your company’s server & network needs to be secure?

Why your company’s server & network needs to be secure?

Estimated reading time: 4 minutes

The continuous availability of a company’s server and protection of data stored in it is crucial for smooth operations of the business. Servers often store critical information regarding products, pricing, support, contacts, etc. which are not only essential for...
Read Blog
July 18, 2017
1 2 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies