Blog Listing

NERC updates may force utility companies into better cybersecurity
Once implemented, these upcoming regulations will ensure electrical utilities are safer from cyber threats, especially those brought in by third parties. Breaches and incidents at utility and other energy-related companies have been rising faster than an electric bill in a Texas summer.
Teaser Feature Image
Monthly Cloud Security Roundup: The Least Secure Industry (According to Hackers), the Cybersecurity Skills Shortage, and More
Each month, we bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the acquisition of Vlocity by Salesforce,...
Yale New Haven matches workstation locations to clinician logins to help manage Coronavirus
A message from Dr. Sean Kelly, Chief Medical Officer, Imprivata
Teaser Feature Image
Monthly Healthcare News Roundup: The Cost of Insider Security Breaches, CTA’s New Healthcare AI Standard, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about the cost of insider security breaches, the Consumer Technology...
Boost manufacturing security with a vendor access management strategy
In our previous blog, we explained how cyberattacks are putting manufacturing systems at greater risk of data loss and malicious activity. Now let’s look at strategies companies can take to tighten up some of the security gaps that can leave manufacturing systems vulnerable to attack.
Five ways cyber attacks put manufacturing systems at risk
Some industries, like financial services and healthcare, have been targets of cyberattacks since day one. For years, manufacturing seemed far less interesting to hackers, and even C-suite executives at these companies weren’t particularly worried about the risk of attack.
Teaser Feature Image
The Cost of Insider Threats in the Healthcare Industry and How to Reduce Them
With mounting costs of insider threats in healthcare, how can organizations protect themselves from risks that come from inside?
Why you need third-party risk management in manufacturing
Manufacturing is changing. As we enter the fourth industrial revolution, factories are becoming globalized, digitized, and relying more and more on the internet of things to produce goods and services. As this transformation continues and once localized entities become smart factories, they are connecting to more third parties. And inviting in more third-party risk.
Teaser Feature Image
Monthly Healthcare News Roundup: Microsoft AI for Health Initiative, 2020 Predictions for Cyberattacks, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about Microsoft’s new AI for Health Initiative, health IT professionals’...
Teaser Feature Image
The NIST Privacy Framework: How to Mitigate Risk and Align Security Efforts
Discover how the new NIST Privacy Framework aligns with the Cybersecurity Framework to simplify your compliance, security, and privacy efforts.
Are you using the right vendor remote access tool? lessons from the texas connectwise ransomware attack
Nearly six months after the Texas mass ransomware attacks that took down operations at 22 small Texas cities, we still talk about it pretty regularly. That's the type of impact a mass ransomware attack can have.
Imprivata OneSign 7.1 Introduces Secure Walkaway Technology
Imprivata, the healthcare digital identity company, has been at the forefront of digital transformation in healthcare.
Considerations in your IAAM journey – Final (Part IV): Why take the risk of integration?
Before you read, catch up on Part 0: An IAAM system overview,
Considerations in your IAAM journey - Part III: What should I manage in my IDG system?
Before you read, catch up on Part 0: An IAAM system overview and
Why third-party risk management matters
We’ve made it through one full month of the New Year and the outlook for terrorism-related cyber incidents is already pretty stormy. During the standoff with Iran, cyberattacks were listed as one of their top possible responses.
Considerations in your IAAM journey - Part II: Role Based Access Control the Unicorn of IAAM…or is it?
Before you read, catch up on Part 0: An IAAM system overview and
Teaser Feature Image
Monthly Cloud Security Roundup: NIST’s New Privacy Framework, Salesforce’s Call for a National Data Privacy Law, and More
Discover the latest cloud security news with January’s roundup, including NIST’s new Privacy Framework and Salesforce’s call for a national data privacy law.
Why MSPs should care about cybersecurity
As a Managed Service Provider (MSP), there are many things you need to focus on to be successful in your business. You have to be a subject matter expert in your particular area in order to convince companies to outsource that function to you, customer service is always important, and response time and time to resolution are critical metrics that organizations will evaluate when deciding whether or not to continue your service.
Considerations in your IAAM journey - Part I: Who does what
In case you missed part 0 in this series, you may want to brush up on 
Considerations in your IAAM journey - Part 0: An IAAM system overview
I’m sure you’re well aware that IAM stands for Identity and Access Management, so you’re probably wondering why I’m calling this an IAAM journey.