Skip to content

Navigating the New Mandatory Reporting Requirements for Breaches

Navigating the New Mandatory Reporting Requirements for Breaches (2)

Threats to business continuity have become more sophisticated, as bad actors are constantly exploiting newly identified vulnerabilities. One question looms large for organizations – is your company prepared to meet the new U.S. reporting requirements for data breaches? As we tiptoe into this uncharted territory, newly issued regulations to maintain compliance are tough to keep…

Read More

Deep Dive: Data Protection Strategies for the Public Sector & Education

Diving Deep Into DataProtection Webinar 550x550 Post

Watch our latest eye-opening on-demand webinar that delves into the paramount importance of data protection for state and local governments, municipalities, and educational systems. In today’s technology-driven world, the risk of data loss looms large, and it can strike in the form of malicious cyber attacks or even accidental data deletions, which affects these high-impact…

Read More

Citrix Remote Code Execution Vulnerability Exploited in the Wild

d3

Dataprise Defense Digest ID: D3-2023-0008-1 Severity: 9.5 Published: July 27, 2023 Executive Summary On July 18, 2023 Citrix announced a critical Remote Code Execution (RCE) vulnerability in NetScaler ADC and NetScaler Gateway being exploited in the wild. This vulnerability with a CVSS score of 9.8 out of 10 is tracked as CVE-2023-3519. Citrix learned of…

Read More

Insuring Your Protection: Why Cyber Insurance is Vital in Today’s Threat Landscape

Cyber Insurance Webinar 550x550 Post

Learn the essentials of cyber insurance from our experts! In this video, we’ll cover why cyber insurance has become essential in today’s digital world and how it can help protect your data and IT investments. We’ll also discuss how the cyber protection landscape has evolved, what type of coverage you should look for, and how…

Read More

The Rising Importance of Cyber Insurance Policies

Copy of Blog Social 1200x627 (1800 × 1800 px) (550 × 550 px)

With the growth of the remote and hybrid workforce, businesses are increasingly reliant on digital technologies. Forbes reported that by 2025, an estimated 32.6 million Americans will work remotely. What’s more, these technologies are becoming more sophisticated and advanced to accommodate different work models. However, with more gaps in technology than ever before, cybersecurity has emerged as…

Read More

Fortinet RCE Vulnerability

d3

Dataprise Defense Digest ID: D3-2023-0008-1CVE Score: 9.8 Critical Published: July 12, 2023 Executive Summary Fortinet has disclosed a Remote Code Execution (RCE) vulnerability that can allow an attacker to execute arbitrary code remotely, potentially compromising the affected devices and their associated networks. This vulnerability is being tracked as CVE-2023-33308, and affects Fortinet devices including firewalls,…

Read More

Apple Webkit Zero-Day Actively Exploited in the Wild

d3

Dataprise Defense Digest ID: D3-2023-0007-1 Published: July 11, 2023 Severity: 9 (CRITICAL) Executive Summary On July 10, 2023, Apple released Rapid Security Response updates for iOS, iPadOS, macOS, and Safari web browser that address a zero-day vulnerability that has been actively exploited in the wild. However, on July 11, 2023, Apple rescinded the updates due…

Read More

Illuminating the Dark Web: Revealing the Hidden Threats to Your Digital Assets

Illuminating the Dark Web 550x550 Post

Illuminating the Dark Web: Revealing the Hidden Threats to Your Digital Assets   Experience an eye-opening expedition into the depths of the dark web with Dataprise. Our expert panel will guide you on a virtual excursion through the hidden recesses of the internet, revealing the unsettling truths of the dark web. Delve into the various types…

Read More

Justice Under Attack: How Cybercriminals Target the Legal Sector

Justice Under Attack 550x550 Post

Justice Under Attack: How Cybercriminals Target the Legal Sector According to the American Bar Association’s 2022 Cybersecurity Report, over 1 in 4 law firms reported experiencing a security breach. As attackers become increasingly stealthy and utilize new resources and methods such as AI, MFA fatigue, and SMS, law firms need to remain ever-vigilant with their…

Read More