Blog Listing

Teaser Feature Image
Photo of Imprivata staff at branded booth
Imprivata at ViVE 2026: Introducing the next generation of fast, secure access for clinical staff
See how modern identity and access strategies like passwordless authentication are improving clinical efficiency and strengthening security.
Teaser Feature Image
Photo of workers in hard hats using computers
Top five benefits of common infrastructure for digital factory solutions in modern manufacturing
As manufacturers modernize, common infrastructure is becoming the foundation of the digital factory. Learn the five key benefits driving productivity, security, and resilience across modern manufacturing environments
Teaser Feature Image
Photo representing digital access
Why securing identity is the fastest path to compliance
What a landmark Australian privacy ruling reveals about identity, access, and regulatory expectations
Teaser Feature Image
Photo of an IT professional working at her desk
How to help your IT help desk shift from password resets to strategic work
Reducing password reset tickets helps IT teams operate more efficiently and better support clinical care.
Teaser Feature Image
Photo of doctor conversing with patient
The movement to Kill the Clipboard: What it means for patients, providers, and the future of care
Healthcare leader and emergency physician Dr.
Teaser Feature Image
Photo of a worker using computers to monitor security
CJIS compliance maturity: Why “meeting requirements” isn’t enough
Passing a CJIS audit doesn’t guarantee long-term compliance. Learn why CJIS compliance maturity matters and how agencies can build a posture that holds up as environments change.
Teaser Feature Image
Photo of doctor using a laptop at work
Why healthcare organizations need to stop trusting passwords
Standard password use continues to undermine healthcare security and clinical efficiency.
Teaser Feature Image
Officer in car with device
CJIS compliance requirements and the 13 security policy areas
If you have any involvement with government entities and operations, chances are you’ve heard of CJIS compliance. It’s the largest division of the FBI and the primary source of information and services for all law enforcement, national security, and intelligence community partners.
Teaser Feature Image
Photo of woman at home using mobile device to use patient portal
The new revenue cycle risk: Why patient portal security can’t wait
For revenue-cycle leaders, securing patient portals isn’t just an IT issue. It’s a business and trust imperative.
Teaser Feature Image
Office worker looking at computer
Top five expert predictions on the identity and access security trends shaping 2026
Critical industries are reaching a technological inflection point.
Teaser Feature Image
Image of person holding mobile device with a digital security check icon digitally overlaid
Securing work that can’t wait: Lessons from the frontlines and critical industries
Learn how three organizations in critical industries are rethinking identity, shared mobile devices, and vendor access to keep essential work frictionles
Teaser Feature Image
Manufacturing professionals
Walking the tightrope: How manufacturers can balance digital transformation and cybersecurity
Manufacturers are embracing Industry 4.0, but digital transformation brings new cybersecurity challenges.
Teaser Feature Image
Photo of onboard computer in police vehicle
A mission to simplify CJIS compliance for those who serve
CJIS compliance shouldn’t slow the mission.
Teaser Feature Image
Photo of a person interacting with a digital screen visualizing passwords and security
What's the best password manager for enterprise organizations?
Passwords are everywhere, and managing them across hundreds of employees, systems, and vendors is more complicated than ever.
Teaser Feature Image
Photo of three members of hospital staff conversing
Navigating the crossroads of cybersecurity policy: Expert guidance for healthcare leaders
As the threat environment intensifies, healthcare leaders must implement robust cybersecurity strategies tailored to the pace of modern healthcare.
Teaser Feature Image
Digital rendering representing access management
Best practices: Eight great ways to help mitigate vendor access risks
Our latest Imprivata thought leadership blog dives into the troubling risks posed by third-party remote access, plus best practices to mitigate them…
Teaser Feature Image
Photo of lawyer using tablet to share data
Solving law firms’ vendor access-security dilemma
Law firms need to give third-party vendors quick, easy access to their data.
Teaser Feature Image
Photo of nurse using mobile device
Evidence meets execution: How 2025 made shared clinical mobility the standard for healthcare
Shared mobile devices are essential for modern healthcare.
Teaser Feature Image
Photo of Imprivata team at booth
Takeaways from InfoSec World 2025: Passwordless access drives better outcomes
Teaser Feature Image
Clinician caring for patient
Making a difference to patient care: The true value of access in clinical workflows
George A. Gellert MD, MPH, MPA, is an epidemiologist focused on using information technology to improve public health outcomes.