Why Static Privilege Models Break Down in Agentic AI Security

Earlier this year, AWS experienced a 13-hour outage that was reportedly linked to one of its own internal AI coding tools. Apparently, their Kiro agentic coding tool thought that there was an issue with the code in the environment, and that the best way to fix it was to simply burn it to the ground.

Top 12 DevOps Automation Tools

The aim of DevOps automation is clear: reduce human error, shorten feedback loops, make repetitive tasks more efficient, and enforce security along with recovery by default. By implementing automation the need for human intervention is reduced – tackling the most common cause of data loss. Table of contents: hide Automation in DevOps Important aspects for automation tools AI in DevOps automation.

Securing Telehealth and Remote Healthcare With Keeper

Telehealth and remote work have become a major part of modern healthcare delivery. Clinicians, IT teams and third-party providers now access Electronic Health Records (EHRs) and billing platforms from home offices, mobile devices and distributed environments. As a result, healthcare organizations must secure access to Protected Health Information (PHI) beyond traditional on-premises environments.

Securing Endpoints With Keeper: Eliminating Local Admin Risk Without Slowing Users Down

Watch the recording of our exclusive webinar featuring Craig Lurey, CTO & Co-Founder of Keeper Security, and see how Keeper Endpoint Privilege Manager (EPM) removes standing admin privileges, enforces least-privilege access and blocks common attack paths, all while maintaining a seamless user experience.

Threat Actors Abuse Messaging Platforms to Launch Phishing Attacks

Messaging platforms are now a major vector for phishing and other social engineering attacks, according to a new report from NCC Group’s Fox-IT. The researchers warn that legitimate messaging apps such as WhatsApp, Telegram, Discord, Signal, LinkedIn, and Gmail-integrated messaging serve as avenues through which attackers can target users while evading email security filters.

OCR HIPAA Enforcement: Website Tracking Investigation Patterns

Three million patients. That’s how many had their most sensitive health information silently siphoned from hospital systems and handed to a party that had no authorization to receive it. The year was 2022. And what would become one of the largest unauthorized disclosures of protected health information ever documented didn’t arrive through a ransomware attack, a stolen credential, or a nation-state intrusion. It came from a piece of marketing software doing exactly what it was designed to do.

Email Security: What It Is, How It Works, and Best Protection Methods

Email-based threats are evolving faster than traditional solutions can keep up. According to Verizon’s 2025 Data Breach Investigations Report, the use of synthetically generated text in malicious emails has doubled over the past two years. That makes it far more difficult to spot social engineering attacks like phishing, which trick users with deceptive messages.

HIPAA + GDPR for Global Healthcare: Overlapping Requirements and Conflicts

If your organization serves patients in both the United States and the European Union, two regulators, HIPAA and GDPR, are already watching your website. Specifically, what happens in the seconds between a visitor landing on your page and your analytics stack doing its job. In March 2024, OCR mentioned that even unauthenticated website interactions, like a user browsing your oncology content or typing into a symptom checker, can constitute PHI if the visit is for health-related purposes.

Navigating the U.S. Public Sector's Unrelenting Cyber Crisis

The U.S. public sector faces unique challenges as it is tasked with safeguarding the most sensitive data of citizens, all while maintaining the critical infrastructure that keeps society functioning. Unfortunately, government and educational institutions are no longer just peripheral targets, they are on the frontline of cyberattacks.

CCPA for Mobile Apps: SDK Tracking Risks and Compliance Gaps

In 2024, the California Attorney General established a new standard for mobile app compliance after securing a $500k settlement with Tilting Point Media, owing to misconfigured SDKs in one of their games that led to inadvertent CCPA and COPPA violations. The issue? The misconfigured SDKs silently caused sales and the share of children’s data without parental consent. And despite the company’s argument that the misconfiguration was unintentional, the AG’s response set a precedent.