The search found 4155 results.
Blog
The move to one trusted vendor for your digital identity strategy may be easier than you think. And the consolidation brings both security and efficiency benefits.
Blog
Managed services may be the key to maturing your identity governance program. Here are some signs you might need to consider it.
News
Supply chain digitalization has become essential to many companies’ bottom lines. Organizations must have visibility into and control of the entire supply chain process, from production to procurement to delivery. In recent years, the expansion of remote work accelerated connectivity and led to greater collaboration beyond the four walls of an establishment…but at what cost?
News
As Imprivata’s VP of Worldwide Engineering, Cyber, Joel Burleson-Davis is responsible for overseeing teams in the organization that build and deliver cybersecurity solutions. Prior to joining Imprivata, he was an engineering manager in Sydney, Australia for 6 years. He holds a master’s degree in liberal arts from St. Edward’s University where his focus was on philosophy and behavioral sciences applied to technology.
Blog
Not only is cybersecurity changing, but the most recent iteration of the general idea, centered around access management, is itself in flux — threats are constantly changing and technology is evolving faster than most industries can implement.
Blog
It’s no secret that organizations are changing the way they operate. Digitization is everywhere, and employees are going from desktops in cubicles to cloud-connected laptops in home offices, coffee shops, and anywhere in between.
Blog
Human error: It’s an everyday occurrence and happens to everyone at some point or another. Unfortunately, when it comes to cybersecurity, human errors, and the human element broadly, can have costly consequences. According to the 2022 Data Breach Investigation Report by Verizon, human error is still a prominent factor when it comes to breaches.
Blog
Third party risk is not new. After all, over half of organizations (51%) were the victim of a third-party data breach in the past year. Third parties are opaque, transient, and harder to govern and limit access to.