Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

HIPAA Release Forms: Everything You Need to Know

A HIPAA release form is a written authorization that grants permission to disclose a patient’s Protected Health Information (PHI) to a specified third party. This form is a requirement under the Health Insurance Portability and Accountability Act (HIPAA) and plays a crucial role in protecting individual privacy rights. HIPAA regulates how personal health information can be used or disclosed by healthcare entities.

Charlotte AI - Agentic Workflows - Hunting Fake CAPTCHAs

Adversaries are faking CAPTCHAs to trick users into running malicious commands—and using AI to make it convincing. See how CrowdStrike’s Charlotte AI and Agentic Workflows detect these threats, automate response with context-aware actions, and adapt based on risk. CrowdStrike Charlotte AI: ► Work smarter, not harder. Turn hours of work into minutes, or even seconds, with a conversational AI assistant.

47% of Breaches Involve Vendors: Is Your TPRM Ready?

Organizations are still struggling to manage vendor-related cyber risk effectively. According to a recent study by Imprivata and the Ponemon Institute, nearly half of organizations fall victim to data breaches involving third-party network access. This isn't just another statistic. It's a critical cybersecurity issue hinting at broader limitations of traditional TPRM programs.

What the UK's New Cyber Resilience Bill Means for Businesses-and How to Stay Ahead

The UK is facing the same evolving digital challenges as the rest of the world, and its new Cyber Security and Resilience Bill is designed to not only help it catch up - but stay ahead. Attackers change their tactics all the time. Without an agile, living framework that gives lawmakers some breathing room, adversaries could easily outstrip the clunky government processes that govern cybersecurity (and often a step behind).

Why we need a unified approach to Kubernetes environments

Today, organizations struggle managing disparate technologies for their Kubernetes networking and network security needs. Leveraging multiple technologies for networking and security for in-cluster, ingress, egress, and traffic across clusters creates challenges, including operational complexities and increased costs.

The Psychology of Deception: How to Protect Yourself from Cyber Fraud

Cybersecurity typically focuses on technical defenses against threats. However, the study of deception can show how cybercriminals exploit human nature for their gain. Scamming is central in many cyberattacks, such as phishing, social engineering, and disinformation campaigns. We can gain insight into how these mechanisms work by mapping the emotions that bad actors aim to trigger in their victims.

The Change Healthcare hack wasn't just a breach-it was a wake-up call

"The US healthcare system is broken" is not an uncommon phrase. With no universal healthcare coverage, administrative inefficiencies, and an under-resourced primary care system, it's so bad that falling ill could very well bankrupt a citizen.

Introducing Aikido AI Cloud Search

Gain instant visibility into your cloud environment with Aikido Cloud Search. Search your cloud like a database. Whether you want to identify exposed databases, vulnerable virtual machines, or over-permissive IAM roles — Aikido gives you the power to uncover risk in seconds. No query language required, no waiting on devops. Just describe what you’re looking for, like “Give me all VMs with CVE-2025-32433 that have port 22 open.” Scroll down to "How It Works" to get technical.

How To Reduce Your Attack Surface with Secure Password Management

With the rise of remote work, cloud computing and mobile devices, your organization’s attack surface is larger than ever. Watch this short video to learn what an attack surface is, how to identify security vulnerabilities and five ways to minimize your attack surface.