• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cybersecurity

The seven key trends that define how cybersecurity is changing

The seven key trends that define how cybersecurity is changing

Estimated reading time: 3 minutes

Rounding up our content for the summit that just went by, it is evident that as the world enters a new decade, there will be a paradigm shift in cybersecurity. This shift is likely to be driven by a...
Read Blog
November 4, 2019

Seqrite Endpoint Security’s compatibility with macOS Catalina (10.15)

Seqrite Endpoint Security’s compatibility with macOS Catalina (10.15)

Estimated reading time: 2 minutes

macOS Catalina is the sixteenth major release of macOS, Apple’s desktop operating system for Macintosh computers. macOS Catalina was released on 7th October 2019.  Is Seqrite Endpoint Security compatible with macOS Catalina (10.15)? Seqrite EPS 7.4 For existing Users...
Read Blog
November 4, 2019

Renewed interests in excelling Security Operation Centres?

Renewed interests in excelling Security Operation Centres?

Estimated reading time: 2 minutes

According to Gartner’s Top 7 Security and Risk Trends 2019 report, a renewed interest towards excelling Security Operation Centres (SOCs) has been considered as among the top two new trends of the year. The evolution of the Security Operations...
Read Blog
November 1, 2019

How are Governments implementing data protection laws?

How are Governments implementing data protection laws?

Estimated reading time: 3 minutes

Data is the currency of this generation. No longer is this truth more evident than in the fact that countries all over the world are instituting data protection laws to prevent unsolicited disclosure or misuse of information about individuals....
Read Blog
October 31, 2019

The benefits of an AI-based approach towards cyber protection

The benefits of an AI-based approach towards cyber protection

Estimated reading time: 2 minutes

The usage of artificial intelligence (AI) promises to be a game-changer for cybersecurity. The threat of cyber attacks and their consequences continue to loom large – in India, a report found that 37% of companies experienced a downtime of...
Read Blog
October 23, 2019

Why do boards need to empower their CISO?

Why do boards need to empower their CISO?

Estimated reading time: 2 minutes

A generation ago, the Chief Information Security Officer (CISO) role rarely existed in enterprises and even if it did, it only existed in large to very large organizations. Even here CISOs were mostly system administrators dealing mainly with IT-related...
Read Blog
October 22, 2019

What to consider before investing in Cloud Security Competency?

What to consider before investing in Cloud Security Competency?

Estimated reading time: 2 minutes

American market research giant Forrester estimated in 2017 that the value of the public cloud market would reach at least $191 billion by 2020. This surge in the valuation is driven by the growing acceptance of cloud computing by...
Read Blog
October 18, 2019

How to build a battle-ready cybersecurity team?

How to build a battle-ready cybersecurity team?

Estimated reading time: 3 minutes

Organizations and the people who run them are slowly perceiving cybersecurity to be a slightly different ball game than information security. As global organizations grapple with cyber threats and aim to keep their enterprises safe from malware, hackers and...
Read Blog
October 16, 2019

Prioritizing Data Security Investments through a Data Security Governance Framework (DSGF)

Prioritizing Data Security Investments through a Data Security Governance Framework (DSGF)

Estimated reading time: 2 minutes

A shift to prioritize data security investments through a Data Security Governance Framework (DSGF) was among the top seven security and risk management trends identified by global research & advisory firm Gartner in 2019. Breaking it down, the report...
Read Blog
October 14, 2019

What is the kill chain and the seven steps involved in it?

What is the kill chain and the seven steps involved in it?

Estimated reading time: 2 minutes

The term ‘kill chain’ originated in the military as a concept to outline and define each stage of an attack. It has found its way into cybersecurity as well as a means to understand the structure of a cyber...
Read Blog
October 11, 2019
← Previous 1 … 13 14 15 … 32 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies