Resources

Refine your skills, enhance your expertise, and bolster your professional credibility with Access Point Consulting's expansive set of resources. Browse our catalog of articles and bulletins for expert cybersecurity guidance, best practices, timely vulnerability and incident reports, breaking industry news, and more.

State of Security

View all podcasts

Practical Insights on Incident Response (with Brian Weidner & Chris Skinner) | State of Security

Summary In this conversation, Geoff Hancock interviews Brian Weidner and Chris Skinner about incident response. They discuss the importance of building strong relationships with the C-suite and legal department, as well as the value of having a trusted incident response company on retainer. They also touch on the challenges of incident response in the critical infrastructure sector and the potential impact of new reporting requirements proposed by DHS. The conversation explores the recently released NIST incident response document and the need for organizations to tailor their incident response plans to their specific needs. The guests emphasize the importance of preparation, communication, and continuous improvement in incident response. Takeaways -Building strong relationships with the C-suite and legal department is crucial for effective incident response. -Having a trusted incident response company on retainer can streamline the response process. -New reporting requirements proposed by DHS may add additional burden to organizations already dealing with regulatory reporting. -The recently released NIST incident response document provides valuable guidance for organizations, but it should be tailored to each organization's specific needs. -Preparation, communication, and continuous improvement are key elements of successful incident response. Chapters 00:00 Introduction 19:45 Challenges in Incident Response for Critical Infrastructure 32:03 Navigating New Reporting Requirements 39:20 The Importance of Preparation, Communication, and Continuous Improvement

Find out more
May 4, 2024

Cisco ASA and FTD Vulnerability Under Active Exploitation

A vulnerability in Cisco Adaptive Security Appliance (ASA) software and Cisco Firepower Threat Defense (FTD) software, categorized as CVE-2024-20353 (CVSSv3: 8.6), results in a denial-of-service condition when exploited, allowing an unauthenticated, remote attacker to cause the device to reload unexpectedly. According to Cisco, this vulnerability is due to incomplete error checking when parsing an HTTP header. It is exploited by sending a specifically crafted HTTP request to a targeted web server. CISA has added this to their Known Exploited Vulnerabilities Catalog, adding to the urgency to remediate.

Find out more
May 3, 2024

Kaiser Permanente Suffers Largest Health-Related Data Breach of 2024, Affecting Millions

In a troubling revelation, Kaiser Permanente, one of the largest healthcare providers in the United States, confirmed a significant data breach that affected approximately 13.4 million current and former members. This incident, detected in April 2024, involved the unauthorized sharing of personal data with third-party advertisers, including major tech entities such as Google, Microsoft, and X (formerly Twitter), through tracking technologies embedded in Kaiser's websites and mobile apps. This breach is now listed as the largest health-related data breach of the year, according to the Department of Health and Human Services, and has raised serious privacy concerns among consumers and regulators alike.

Find out more
May 2, 2024

R Programming Language Vulnerable to Attack

A vulnerability present in the R programming language on versions 1.4.0 through 4.4.0., categorized as CVE-2024-27322 (CVSSv3: 8.8), allows a remote attacker to send a maliciously crafted RDS-formatted file or R package to run arbitrary code on a user’s system. This vulnerability requires the user to interact with the RDS formatted file or R package. The research for this vulnerability comes from HiddenLayer.

Find out more

Guides & Whitepapers

View all
Dangers of Unpatched Healthcare IoT and Network Systems

Dangers of Unpatched Healthcare IoT and Network Systems

It’s not uncommon for large healthcare organizations to support patients via thousands of systems––servers, network hardware, and Internet of Things (IoT) devices particular to the medical practice. Healthcare organizations are primary targets for attackers and are required to follow strict regulations to stop data breaches. HIPAA violations are costly, and unpatched hardware leaves healthcare systems vulnerable to numerous threats including malware, ransomware, security bypasses, and possible remote code execution. Patching systems with the latest update is critical to data protection and risk management, and it keeps the company compliant with HIPAA guidelines.

Find out more
6cd7600d-b040-4723-b0cd-2d93e6b65dbc
Virtual
Live

Reception at Top Golf | SecureWorld Philadelphia

Wed, April 17, 2024 | 4:30 PM-7:30 PM
Top Golf King of Prussia
Live
Virtual

7th Annual Medtech Cybersecurity Risk Mitigation Conference

Tue, Oct 3, 2023 9:00 am - Wed, Oct 4, 2023, 2:30 pm