Blog Listing

Teaser Feature Image
Photo of nurse using mobile device
Evidence meets execution: How 2025 made shared clinical mobility the standard for healthcare
Shared mobile devices are essential for modern healthcare.
Teaser Feature Image
Photo of Imprivata team at booth
Takeaways from InfoSec World 2025: Passwordless access drives better outcomes
Teaser Feature Image
Photo of doctors and nurses walking and talking while using tablet
Why “one-size-fits-all” multifactor authentication (MFA) fails healthcare providers
In this interview, John Clark, SVP of Product Management at Imprivata, discusses why healthcare organizations need authentication built for clinical envi
Teaser Feature Image
Manufacturing professional accessing CAD
What’s the “right” level of access? Examining operational security governance in manufacturing
Legacy systems, shared devices, and third-party access are stretching security thin.
Teaser Feature Image
Photo of hands typing on a laptop with a lock overlaid
Build security around identity with risk intelligence: Best practices from the CPO
Effective identity and access security depends on strengthening trust and cyber resilience through AI-powered identity threat detection and response.
Teaser Feature Image
Photo of digital links
Five ways to enhance security and usability during Cybersecurity Awareness Month
At a time when security and efficiency are crucial for modern enterprises, business leaders can’t afford to choose one over the other.
Teaser Feature Image
Photo of two doctors working on mobile devices
Shared mobile devices, shared success: How healthcare leaders are redefining clinical mobility, security, and ROI in 2025
Shared mobile devices are transforming care delivery in 2025.
Teaser Feature Image
Image of person holding an electronic medical record
Preventing medical errors: Enhancing safety and reducing costs
Patient misidentification is a leading cause of medical errors, fueling patient harm, denied claims, and unnecessary costs.
Teaser Feature Image
Illustration of OT/IT integrations
Top 5 security concerns for IT/OT integrations
As organizations accelerate IT/OT integration, they face new security risks tied to legacy systems, shared logins, and misaligned priorities.
Teaser Feature Image
Photo of Imprivata booth at conference
A look ahead: Advancing passwordless access at InfoSec World
For decades, organizations have poured resources into securing systems with stronger and more complex passwords.
Teaser Feature Image
Photo of patient paying at hospital
Reducing reimbursement friction, and reclaiming millions with accurate patient identification
Patient identification is important. It’s also complicated.
Teaser Feature Image
Russell Dowdell
Russell fields five: Answers to five key questions on managing third-party vendor access risks
Russell Dowdell, Imprivata Senior Director, Product Management, Privileged Access, tackles five pivotal questions, sharing valuable insights and best pra
Teaser Feature Image
Manufacturing professionals in warehouse
What are the 3 biggest challenges of Industry 4.0 for manufacturing organizations?
Industry 4.0 is transforming manufacturing — but rising cyber risks, legacy infrastructure, and lack of standards stand in the way.
Teaser Feature Image
Photo of clinician using mobile device in scrubs
Why shared mobile is the new gold standard in clinical workflow: From convenience to necessity
Shared mobile devices are transforming clinical workflows.
Teaser Feature Image
Photo of worker looking at data
Your login process is killing productivity—Here’s the data
In industries where seconds matter, workers are losing minutes, sometimes hours, trying to log in to the systems they need to do their jobs.
Teaser Feature Image
Photo of team working on monitors
The new rules of authentication for critical industries
The shifting cybersecurity landscapeThe cybersecurity landscape is changing quickly, but not necessarily in ways that make defenders’ jobs easier.
Teaser Feature Image
Photo of clinician using a mobile device
From 13 minutes to instant access: Optimizing your shared mobile program
Clinicians waste an average of 13 minutes per shift just getting mobile devices ready to use.
Teaser Feature Image
Aerial View of the Atlanta Suburb of Marietta, Georgia
How Marietta, GA, made CJIS compliance work in the real world
Marietta, GA, shows that CJIS compliance can be more than a checkbox.
Teaser Feature Image
Photo of employee providing remote support to vendor
Remote support for enterprise: How to grant vendors secure access and level-up your customer service
Enterprises can’t afford delays — or security gaps — in remote support.
Teaser Feature Image
Illustrated image of computer with security icons overlaid
Am I responsible for ransomware and compromised devices?
From lost devices to phishing attacks, ransomware responsibility raises tough questions.