More CyberWatch

February 12, 2025

Troy Bowman | Securing the cloud

Many small and mid-sized businesses assume that moving to the cloud means security is automatically handled by the provider. But as Troy Bowman, Senior Security Engineer, explains, that’s a dangerous misconception.

Read more
February 5, 2025

Helen Patton (Cisco) | Crafting an effective cybersecurity strategy

Cybersecurity is often seen as a reactive field, constantly responding to threats as they emerge. But Helen Patton, Cybersecurity Executive Advisor at Cisco, argues that a well-defined cybersecurity strategy can shift the focus to a proactive approach—one that aligns security efforts with broader business objectives.

Read more
January 29, 2025

Ricoh Danielson (Vitrix Health) | Building a security culture and embracing AI

Being a CISO has never been easy, and 2025 doesn't promise to make it any easier. What you need to know to begin and to succeed in the job. Today we're talking with Ricoh Danielson. Ricoh is the CISO at Virtix Health. He has a wealth of experience as a CISO, as a cybersecurity expert, and as someone in demand for his knowledge of risk and cybersecurity around the world. We talked to him about what the job of CISO is in 2025, what you need to know if you're moving into the role and, most important, what you need to know to succeed as a CISO this year and for the coming years.

Read more
November 22, 2024

Patch Updates, New Malware Threats, and the Ongoing Supply Chain Battle

On this episode of the CyberWatch podcast, there are updates to software across the application and OS spectrum. New malicious campaigns are threatening victims of all sizes, and researchers have performed dissections on malware to give defenders new clues about just what it is they're fighting. All this today, in CyberWatch.

Read more
October 25, 2024

Ransomware, Supply Chain Attacks, and Nation-State Threats

CyberWatch, by Access Point Consulting, is your weekly source for emerging cybersecurity news, regulatory updates, and threat intelligence. Backed by experts in security consulting, regulatory compliance, and security operations, Access Point enables you to manage cyber risks, respond to incidents, and drive innovation in your company. Read here or on our website; listen on Spotify or Apple Podcasts; or watch on YouTube.website; listen on Spotify or Apple Podcasts; or watch on YouTube. .

Read more
October 7, 2024

VINs and Losses: How Hackers Take Kias for a Ride

In the age of smart cars and connected devices, convenience often comes with hidden risks. A recently discovered critical vulnerability in Kia vehicles serves as a stark reminder of how our increasingly digital world is making cars new targets for cyberattacks. This vulnerability allowed hackers to remotely control various vehicle functions—using nothing more than a car's license plate number. It highlights the growing threat of cyberattacks on connected cars and the importance of cybersecurity in the automotive industry.

Read more
October 3, 2024

Vulnerability in SolarWinds Managed File Transfer Server Actively Exploited

CVE-2024-28995 SolarWinds has issued a critical update for a zero-day vulnerability in its Serv-U MFT Server, allowing attackers to bypass security and access restricted files without authentication. Actively exploited, this flaw poses a significant risk for businesses that delay applying the fix.

Read more
October 1, 2024

Critical Container Flaw Could Impact NVIDIA AI Services

On September 25th, NVIDIA issued a security advisory regarding a critical vulnerability (CVE-2024-0132) in the NVIDIA Container Toolkit. This Time-of-Check Time-of-Use (TOCTOU) flaw allows a specially crafted container image to access the host file system. The vulnerability impacts most AI applications in both cloud and on-prem environments using NVIDIA GPUs.

Read more
September 30, 2024

Cybersecurity's New Playing Field: Why Sports Organizations Draw Hackers

If hackers follow the Willie Sutton rule — going where the money/data/geopolitical leverage is, then professional sports organizations, or PSOs, represent a kind of perfect storm of motivation.

Read more