Blog Listing

Teaser Feature Image
Image of patient talking with clinician
Celebrating Patient Access Week: Securing the care journey from registration to outcome
This Patient Access Week, we recognize the teams on the front lines of care and the critical role of trusted identity in delivering secure, seamless pati
Teaser Feature Image
Humanoid face formed with particles
Imprivata helps organizations secure critical access and strengthen continuous monitoring for the AI era
AI is accelerating risk and exposing gaps in traditional security models.
Teaser Feature Image
Photo of doctor using computer to access secure network
Bridging the passwordless gap: A practical roadmap for healthcare IT
Healthcare leaders see passwordless access as mission-critical, yet few have fully implemented it.
Teaser Feature Image
Photo of woman using a laptop
The state of third-party access security: Are we gaining ground or spinning wheels?
Our latest Imprivata thought leadership blog examines the continued challenges of third-party access management, plus best practices to mitigate risks.
Teaser Feature Image
Manufacturing professional working with a remote workstation
Third-party access in manufacturing: Managing vendors and associated risk
Manufacturers rely on vendors to keep operations running, but every connection introduces risk.
Teaser Feature Image
Mobile devices in manufacturing
Managing mobile devices and workstations on the factory floor: Improving usage, workflows, and performance
Shared devices keep manufacturing moving, but they also introduce security and workflow challenges.
Teaser Feature Image
Person accessing computer remotely
What is vendor privileged access management (VPAM)?
If you’re in the cybersecurity world, you’ve probably come across the acronym PAM, or Privileged Access Management. This technology adds additional access controls and processes to coveted privileged credentials in order to prevent them from being compromised, while also limiting the damage if they ever are compromised.
Teaser Feature Image
person inputting password on keyboard
The problem with traditional passwords
Password problems persist despite decades of guidance and enforcement.
Teaser Feature Image
Photo of healthcare professional using agentic AI
The rise of AI agents in healthcare: A breakthrough—or a breach waiting to happen?
Healthcare’s newest workforce may be AI agents, but their autonomy introduces serious security concerns.As AI agents gain system access and auto
Teaser Feature Image
Manufacturing professional working with equipment
SCADA security: Best practices for evolving your manufacturing technology
SCADA systems power modern manufacturing. But increased connectivity also increases cyber risk.
Teaser Feature Image
Manufacturing professional accessing CAD
IT/OT convergence in manufacturing: Barriers, risks, and what leaders need to know
IT/OT convergence is transforming manufacturing, connecting enterprise systems with industrial operations to drive efficiency and innovation.
Teaser Feature Image
Medical professional using digital tools to access workstation
From password fatigue to passwordless workflows: A clinician’s day reimagined
At 6:52 a.m., the unit is already moving.
Teaser Feature Image
Uniform police officer accessing CJIS information on a tablet on the job
Align CJIS compliance with the way public safety teams operate
Many agencies meet CJIS requirements but struggle when security controls collide with real-world workflows. Discover more about where CJIS access breaks down in practice and what durable, audit-ready access really looks like.
Teaser Feature Image
Delivery gig worker with bicycle and thermal backpack waiting to cross the street
Account fraud in the gig economy: The identity loopholes undermining platforms and workers
Fraudulent online accounts are reshaping risk in the gig economy, leaving platforms and workers exposed due to weak identity protection.
Teaser Feature Image
Hooded man with obscured face using smartphone, symbolizing ban evasion, hacker activity, data theft, and cybersecurity threat
Ban evasion detection: Protecting platform integrity
Ban evasion erodes account credibility, undermines user trust, and exposes platforms to fraud. Here’s how to detect and prevent it proactively.
Teaser Feature Image
Photo of man working on manufacturing floor
CMMC 2.0 for manufacturers: Where access control breaks down on the shop floor
Compliance with CMMC 2.0 is
Teaser Feature Image
Computer hacker in hoodie with obscured face. Account fraud. Data thief. Darknet and cybersecurity risks.
Tapping into the power of account fraud detection in the age of identity-based attacks
Account fraud detection has become a defining security challenge as identity-based attacks increasingly exploit legitimate credentials and sessions.
Teaser Feature Image
Photo of Imprivata demo booth
Imprivata on the road to HIMSS 2026: Advancing secure access for the future of healthcare
Bringing the next generation of access management to HIMSS26.
Teaser Feature Image
Data scam alert popup on laptop screen warning icon for online fraud, phishing attack, identity theft, security breach, internet scam, personal data risk, and cyber threat
A move toward behavioral analysis, real-time insights, and actionable intelligence can help protect organizations from identity-based threats
The rise of Identity Threat Detection and Response (ITDR) reflects the urgent need to address identity-based attacks in today’s cybersecurity landscape.
Teaser Feature Image
Image of IT professionals talking
Ending password pain in healthcare: What over 200 IT leaders are saying about passwordless access
Healthcare IT leaders overwhelmingly agree that passwords are holding back care delivery, but few have fully moved beyond them.

You are currently browsing

Product availability varies by region. Would you like to choose a different region?

No thank you, I'd like to continue