Blog Listing

Why you need third-party risk management in manufacturing
Why you need third-party risk management in manufacturing
Manufacturing is changing. As we enter the fourth industrial revolution, factories are becoming globalized, digitized, and relying more and more on the internet of things to produce goods and services. As this transformation continues and once localized entities become smart factories, they are connecting to more third parties. And inviting in more third-party risk.
Monthly Healthcare News Roundup: Microsoft AI for Health Initiative, 2020 Predictions for Cyberattacks, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about Microsoft’s new AI for Health Initiative, health IT professionals’...
The NIST Privacy Framework: How to Mitigate Risk and Align Security Efforts
Discover how the new NIST Privacy Framework aligns with the Cybersecurity Framework to simplify your compliance, security, and privacy efforts.
Are you using the right vendor remote access tool? lessons from the texas connectwise ransomware attack
Are you using the right vendor remote access tool? lessons from the texas connectwise ransomware attack
Nearly six months after the Texas mass ransomware attacks that took down operations at 22 small Texas cities, we still talk about it pretty regularly. That's the type of impact a mass ransomware attack can have.
Imprivata OneSign 7.1 Introduces Secure Walkaway Technology
Imprivata OneSign 7.1 Introduces Secure Walkaway Technology
Imprivata, the healthcare digital identity company, has been at the forefront of digital transformation in healthcare.
Considerations in your IAAM journey – Final (Part IV): Why take the risk of integration?
Considerations in your IAAM journey – Final (Part IV): Why take the risk of integration?
Before you read, catch up on Part 0: An IAAM system overview,
Considerations in your IAAM journey - Part III: What should I manage in my IDG system?
Considerations in your IAAM journey - Part III: What should I manage in my IDG system?
Before you read, catch up on Part 0: An IAAM system overview and
Why third-party risk management matters
Why third-party risk management matters
We’ve made it through one full month of the New Year and the outlook for terrorism-related cyber incidents is already pretty stormy. During the standoff with Iran, cyberattacks were listed as one of their top possible responses.
Considerations in your IAAM journey - Part II: Role Based Access Control the Unicorn of IAAM…or is it?
Considerations in your IAAM journey - Part II: Role Based Access Control the Unicorn of IAAM…or is it?
Before you read, catch up on Part 0: An IAAM system overview and
Monthly Cloud Security Roundup: NIST’s New Privacy Framework, Salesforce’s Call for a National Data Privacy Law, and More
Discover the latest cloud security news with January’s roundup, including NIST’s new Privacy Framework and Salesforce’s call for a national data privacy law.
Why MSPs should care about cybersecurity
Why MSPs should care about cybersecurity
As a Managed Service Provider (MSP), there are many things you need to focus on to be successful in your business. You have to be a subject matter expert in your particular area in order to convince companies to outsource that function to you, customer service is always important, and response time and time to resolution are critical metrics that organizations will evaluate when deciding whether or not to continue your service.
Considerations in your IAAM journey - Part I: Who does what
Considerations in your IAAM journey - Part I: Who does what
In case you missed part 0 in this series, you may want to brush up on 
Considerations in your IAAM journey - Part 0: An IAAM system overview
Considerations in your IAAM journey - Part 0: An IAAM system overview
I’m sure you’re well aware that IAM stands for Identity and Access Management, so you’re probably wondering why I’m calling this an IAAM journey.
How to survive a cybersecurity audit
How to survive a cybersecurity audit
If you’re in a regulated industry or serve customers that are, sooner or later you will probably have auditors examine your cybersecurity setup. This may be on the behalf of clients, or for your own internal corporate governance.
3 Key Learnings from the Gartner IAM Summit
3 Key Learnings from the Gartner IAM Summit
I recently had the opportunity to attend the 2019 Gartner Identity & Access Management (IAM) Summit in Las Vegas.
The NIST Privacy Framework: How Does It Compare to the Cybersecurity Framework?
The new NIST Privacy Framework is designed to help organizations improve individuals’ privacy through enterprise risk management.
The risks of business associates and HIPAA compliance
The risks of business associates and HIPAA compliance
In May 2019, the American Medical Collection Agency (AMCA), a "business associate" of a number of healthcare providers, reported an eight-month data breach had exposed sensitive information for more than 20 million patients.
The problems with relying on passive mobile device security
The problems with relying on passive mobile device security
A recent survey shed some light on a security trend that leaves healthcare organizations vulnerable to attacks: nearly half of respondents said that they rel
Imprivata FairWarning to Deliver Monthly Product Releases to Improve Customer Experience
Discover how Imprivata FairWarning's new monthly product release schedule will benefit customers and deliver more significant improvements, more often.
Monthly Healthcare News Roundup: Rethinking Patient Data Privacy in the Digital Age, How GDPR and CCPA Could Impact Healthcare, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about rethinking patient data privacy in the digital age, how GDPR and CCPA...