Blog Listing

Teaser Feature Image
Photo of 2FA in action
Introduction: Not All MFA is Created Equal
In both organizational and private applications, Multi-Factor Authentication (MFA) has established itself as the standard method for login verification.
Teaser Feature Image
Photo of IT Team Strategizing
IT Security KPIs: From Technology to Strategy
In information security, KPIs serve as a control and management tool: they make risks comparable, prioritize investments, and provide evidence for audits and
Teaser Feature Image
Photo of man using computer
MaRisk: The Pillars of Modern Banking Risk Management
The MaRisk (Minimum Requirements for Risk Management) are binding administrative instructions issued by BaFin (Federal Fina
Teaser Feature Image
Photo of Imprivata staff at branded booth
Imprivata at ViVE 2026: Introducing the next generation of fast, secure access for clinical staff
See how modern identity and access strategies like passwordless authentication are improving clinical efficiency and strengthening security.
Teaser Feature Image
Photo of workers in hard hats using computers
Top five benefits of common infrastructure for digital factory solutions in modern manufacturing
As manufacturers modernize, common infrastructure is becoming the foundation of the digital factory. Learn the five key benefits driving productivity, security, and resilience across modern manufacturing environments
Teaser Feature Image
Photo representing digital access
Why securing identity is the fastest path to compliance
What a landmark Australian privacy ruling reveals about identity, access, and regulatory expectations
Teaser Feature Image
Photo of an IT professional working at her desk
How to help your IT help desk shift from password resets to strategic work
Reducing password reset tickets helps IT teams operate more efficiently and better support clinical care.
Teaser Feature Image
Photo of doctor conversing with patient
The movement to Kill the Clipboard: What it means for patients, providers, and the future of care
Healthcare leader and emergency physician Dr.
Teaser Feature Image
Photo of a worker using computers to monitor security
CJIS compliance maturity: Why “meeting requirements” isn’t enough
Passing a CJIS audit doesn’t guarantee long-term compliance. Learn why CJIS compliance maturity matters and how agencies can build a posture that holds up as environments change.
Teaser Feature Image
Photo of doctor using a laptop at work
Why healthcare organizations need to stop trusting passwords
Standard password use continues to undermine healthcare security and clinical efficiency.
Teaser Feature Image
Officer in car with device
CJIS compliance requirements and the 13 security policy areas
If you have any involvement with government entities and operations, chances are you’ve heard of CJIS compliance. It’s the largest division of the FBI and the primary source of information and services for all law enforcement, national security, and intelligence community partners.
Teaser Feature Image
Photo of woman at home using mobile device to use patient portal
The new revenue cycle risk: Why patient portal security can’t wait
For revenue-cycle leaders, securing patient portals isn’t just an IT issue. It’s a business and trust imperative.
Teaser Feature Image
Office worker looking at computer
Top five expert predictions on the identity and access security trends shaping 2026
Critical industries are reaching a technological inflection point.
Teaser Feature Image
Image of person holding mobile device with a digital security check icon digitally overlaid
Securing work that can’t wait: Lessons from the frontlines and critical industries
Learn how three organizations in critical industries are rethinking identity, shared mobile devices, and vendor access to keep essential work frictionles
Teaser Feature Image
Manufacturing professionals
Walking the tightrope: How manufacturers can balance digital transformation and cybersecurity
Manufacturers are embracing Industry 4.0, but digital transformation brings new cybersecurity challenges.
Teaser Feature Image
Photo of onboard computer in police vehicle
A mission to simplify CJIS compliance for those who serve
CJIS compliance shouldn’t slow the mission.
Teaser Feature Image
Photo of a person interacting with a digital screen visualizing passwords and security
What's the best password manager for enterprise organizations?
Passwords are everywhere, and managing them across hundreds of employees, systems, and vendors is more complicated than ever.
Teaser Feature Image
Photo of three members of hospital staff conversing
Navigating the crossroads of cybersecurity policy: Expert guidance for healthcare leaders
As the threat environment intensifies, healthcare leaders must implement robust cybersecurity strategies tailored to the pace of modern healthcare.
Teaser Feature Image
Digital rendering representing access management
Best practices: Eight great ways to help mitigate vendor access risks
Our latest Imprivata thought leadership blog dives into the troubling risks posed by third-party remote access, plus best practices to mitigate them…
Teaser Feature Image
Photo of lawyer using tablet to share data
Solving law firms’ vendor access-security dilemma
Law firms need to give third-party vendors quick, easy access to their data.