• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

The burning issue of building a cybersecurity framework

The burning issue of building a cybersecurity framework

Estimated reading time: 2 minutes

Strategic planning and performance reviews have always been an important component for the c-suite and members of the board. Adding on to their responsibilities, now, cybersecurity has also become an essential part of the conversation that enterprise stakeholders have,...
Read Blog
December 3, 2019

Windows 10 Nov 2019 Update supported by Seqrite Endpoint Security

Windows 10 Nov 2019 Update supported by Seqrite Endpoint Security

Estimated reading time: 2 minutes

Microsoft has recently released a new update for Windows 10 PCs, called Windows 10 November 2019 Update also known as Version 1909 and codenamed “19H2”. In this article, some of the highlights of this update are listed and how Seqrite...
Read Blog
December 2, 2019

Seqrite Endpoint Security Cloud Supports the Windows 10 Nov 2019 Update

Seqrite Endpoint Security Cloud Supports the Windows 10 Nov 2019 Update

Estimated reading time: 2 minutes

Microsoft has recently come up with a new update for Windows 10 PCs, called Windows 10 November 2019 Update, also known as Version 1909 and codenamed “19H2”. Here we’ll list down some of the highlights of this update and see...
Read Blog
November 29, 2019

Crucial aspects CISOs should look at while building a businesses’ cybersecurity roadmap

Crucial aspects CISOs should look at while building a businesses’ cybersecurity roadmap

Estimated reading time: 3 minutes

Cybersecurity has had a heightened impact in 2019, made visible by the growing responsibilities of the Chief Information Security Officer (CISO). A decade back, cybersecurity was a function looked at by Chief Information Officers and IT teams. However, cybersecurity...
Read Blog
November 27, 2019

What kind of hackers exists in the cybersecurity world?

What kind of hackers exists in the cybersecurity world?

Estimated reading time: 2 minutes

Hackers, by definition, are skilled computer experts that have the ability to overcome technological problems. Thanks to the wide representation of hackers in books, movies and other popular culture,  a large number of people have a fair idea of...
Read Blog
November 26, 2019

Preventing malware from spreading with Seqrite Endpoint Security

Preventing malware from spreading with Seqrite Endpoint Security

Estimated reading time: 2 minutes

The spread of computer malware can be devastatingly fast — a cursory look at some of the top computer malware in the age of modern history shows the speed at which they replicate and the damage they cause. From...
Read Blog
November 25, 2019

Why should enterprise directors get cybersecurity experts on board?

Why should enterprise directors get cybersecurity experts on board?

Estimated reading time: 2 minutes

The board of directors provide good governance and build a strategy for the enterprise. The successful running and well-being of a business often depend on the vision and direction provided by a competent board as they decide and execute...
Read Blog
November 21, 2019

Is a chief cybersecurity officer critical for the enterprise?

Is a chief cybersecurity officer critical for the enterprise?

Estimated reading time: 3 minutes

In 2015, the Government of India established a first of sorts – they created a chief cybersecurity officer position under the Prime Minister’s Office. Dr Gulshan Rai became the special secretary for cybersecurity and after serving four years in...
Read Blog
November 20, 2019

Information security is a business concern, not just an IT concern!

Information security is a business concern, not just an IT concern!

Estimated reading time: 2 minutes

The global research and advisory firm Gartner estimated that worldwide information security spending would exceed $124 billion in 2019. The reason for such spending in information security is justified when one looks at the consequences of ignoring the risk...
Read Blog
November 19, 2019

How can CISOs defend businesses from supply chain attacks?

How can CISOs defend businesses from supply chain attacks?

Estimated reading time: 3 minutes

A supply chain is an omnipresent and inseparable element in every business, irrespective of its size.  Hence, when it comes to cybersecurity specific to this aspect, simply protecting an enterprise’s periphery isn’t enough. Supply chains consist of people, logistics,...
Read Blog
November 18, 2019
← Previous 1 … 9 10 11 … 42 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies