Monthly Cloud Security Roundup: The Least Secure Industry (According to Hackers), the Cybersecurity Skills Shortage, and More
Each month, we bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the acquisition of Vlocity by Salesforce,...
Yale New Haven matches workstation locations to clinician logins to help manage Coronavirus
Yale New Haven matches workstation locations to clinician logins to help manage Coronavirus
A message from Dr. Sean Kelly, Chief Medical Officer, Imprivata
Monthly Healthcare News Roundup: The Cost of Insider Security Breaches, CTA’s New Healthcare AI Standard, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about the cost of insider security breaches, the Consumer Technology...
Boost manufacturing security with a vendor access management strategy
Boost manufacturing security with a vendor access management strategy
In our previous blog, we explained how cyberattacks are putting manufacturing systems at greater risk of data loss and malicious activity. Now let’s look at strategies companies can take to tighten up some of the security gaps that can leave manufacturing systems vulnerable to attack.
Five ways cyber attacks put manufacturing systems at risk
Five ways cyber attacks put manufacturing systems at risk
Some industries, like financial services and healthcare, have been targets of cyberattacks since day one. For years, manufacturing seemed far less interesting to hackers, and even C-suite executives at these companies weren’t particularly worried about the risk of attack.
The Cost of Insider Threats in the Healthcare Industry and How to Reduce Them
With mounting costs of insider threats in healthcare, how can organizations protect themselves from risks that come from inside?
Why you need third-party risk management in manufacturing
Why you need third-party risk management in manufacturing
Manufacturing is changing. As we enter the fourth industrial revolution, factories are becoming globalized, digitized, and relying more and more on the internet of things to produce goods and services. As this transformation continues and once localized entities become smart factories, they are connecting to more third parties. And inviting in more third-party risk.
Monthly Healthcare News Roundup: Microsoft AI for Health Initiative, 2020 Predictions for Cyberattacks, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about Microsoft’s new AI for Health Initiative, health IT professionals’...
The NIST Privacy Framework: How to Mitigate Risk and Align Security Efforts
Discover how the new NIST Privacy Framework aligns with the Cybersecurity Framework to simplify your compliance, security, and privacy efforts.
Are you using the right vendor remote access tool? lessons from the texas connectwise ransomware attack
Are you using the right vendor remote access tool? lessons from the texas connectwise ransomware attack
Nearly six months after the Texas mass ransomware attacks that took down operations at 22 small Texas cities, we still talk about it pretty regularly. That's the type of impact a mass ransomware attack can have.
Imprivata OneSign 7.1 Introduces Secure Walkaway Technology
Imprivata OneSign 7.1 Introduces Secure Walkaway Technology
Imprivata, the healthcare digital identity company, has been at the forefront of digital transformation in healthcare.
Considerations in your IAAM journey – Final (Part IV): Why take the risk of integration?
Considerations in your IAAM journey – Final (Part IV): Why take the risk of integration?
Before you read, catch up on Part 0: An IAAM system overview,
Considerations in your IAAM journey - Part III: What should I manage in my IDG system?
Considerations in your IAAM journey - Part III: What should I manage in my IDG system?
Before you read, catch up on Part 0: An IAAM system overview and
Why third-party risk management matters
Why third-party risk management matters
We’ve made it through one full month of the New Year and the outlook for terrorism-related cyber incidents is already pretty stormy. During the standoff with Iran, cyberattacks were listed as one of their top possible responses.
Considerations in your IAAM journey - Part II: Role Based Access Control the Unicorn of IAAM…or is it?
Considerations in your IAAM journey - Part II: Role Based Access Control the Unicorn of IAAM…or is it?
Before you read, catch up on Part 0: An IAAM system overview and
Monthly Cloud Security Roundup: NIST’s New Privacy Framework, Salesforce’s Call for a National Data Privacy Law, and More
Discover the latest cloud security news with January’s roundup, including NIST’s new Privacy Framework and Salesforce’s call for a national data privacy law.
Why MSPs should care about cybersecurity
Why MSPs should care about cybersecurity
As a Managed Service Provider (MSP), there are many things you need to focus on to be successful in your business. You have to be a subject matter expert in your particular area in order to convince companies to outsource that function to you, customer service is always important, and response time and time to resolution are critical metrics that organizations will evaluate when deciding whether or not to continue your service.
Considerations in your IAAM journey - Part I: Who does what
Considerations in your IAAM journey - Part I: Who does what
In case you missed part 0 in this series, you may want to brush up on 
Considerations in your IAAM journey - Part 0: An IAAM system overview
Considerations in your IAAM journey - Part 0: An IAAM system overview
I’m sure you’re well aware that IAM stands for Identity and Access Management, so you’re probably wondering why I’m calling this an IAAM journey.
How to survive a cybersecurity audit
How to survive a cybersecurity audit
If you’re in a regulated industry or serve customers that are, sooner or later you will probably have auditors examine your cybersecurity setup. This may be on the behalf of clients, or for your own internal corporate governance.