Blog Listing

Looking back on the Colonial Pipeline hack
Looking back on the Colonial Pipeline hack
It’s been one year since Colonial Pipeline was infamously hacked, creating fuel shortages, driving up gas prices, and creating a state of emergency. We’ve dug into this hack many times before, but looking back on one of the biggest critical infrastructure attacks shows us both why this cyber incident is so important and how organizations should move forward with their cybersecurity strategies after the many lessons learned from the attack.
Insider threats are a major security issue in the financial sector
Insider threats are a major security issue in the financial sector
The Financial industry is becoming a hot target for hackers and ransomware, and it’s no surprise — the industry does deal with money, after all. The sector is 300 times more likely to experience a cyberattack than any other industry, and the industry is absorbing the highest cost with an average of $18.3 million lost per cyberattack.  But it’s not just the Scrooge McDuck-style pools of coins and cash that cause hackers to turn their eyes to financial institutions. It’s the access. The industry has a vast amount of internal users that can quickly turn into insider threats. 
Drug diversion and monitoring solutions
Drug diversion and monitoring solutions
For a healthcare organization, monitoring access is critical, but that monitoring extends beyond just EMR data — to drug diversion. Drug diversion refers to the illegal distribution of prescription drugs, specifically referring to illegal distribution or abuse by medical professionals. According to the U.S. Department of Justice National Drug Intelligence Center (NDIC), the estimated cost of diversion to public and private medical insurers is more than $72 billion per year.
Enterprise access and PAM are a perfect pair
Enterprise access and PAM are a perfect pair
As Imprivata strengthens its portfolio with SecureLink, the Securelink Enterprise Access platform will now seamlessly integrate into Imprivata's PAM solution. This software collaboration now allows enterprise organizations to secure and efficiently manage all privileged access to critical assets. That’s a capability all organizations need to stay secure.
Image of a shield with a target, with arrows struck at the bullseye
10 reasons why hackers think your HDO is an easy target
And why many CIOs are choosing managed services to bridge the IT resource gap and boost security.
Why the retail industry should embrace access management
Why the retail industry should embrace access management
The Works, which sells books, toys, and other objects, has 520 stores across the UK. Recently, many of those locations had to temporarily close after a major cyberattack on the retailer. This kind of cybersecurity incident is becoming more and more common across the globe as cyberattacks soar and industries like retail find themselves digitizing faster than their cybersecurity architecture can keep up.
What is adaptive security?
What is adaptive security?
No attack vector is new. Ransomware, remote access breaches, phishing and other forms of cyber-espionage have been around for decades, yet we’re constantly coming up with new ways to solve them. Technology has evolved to meet the growing need to protect critical access points and assets from cyber-threats, but vulnerabilities are inherent.
Cybersecurity mesh architecture is the next big trend in cybersecurity
Cybersecurity mesh architecture is the next big trend in cybersecurity
The word is already making the rounds in analyst meetings, white papers, and slide decks: cybersecurity mesh. Is it new software? Or a new attack vector? Or something else entirely? The fact is that cybersecurity mesh architecture is a concept all organizations need to be paying attention to and utilizing in their own cybersecurity strategies.
Tribal casinos are becoming a major target for ransomware
Tribal casinos are becoming a major target for ransomware
There’s plenty of money in casinos, and we’re not talking about the coins rattling around in slot machines. Tribal casinos are becoming a new target for ransomware attacks, with bad actors holding systems for ransom and making away with some serious dough.
Thumbnail image of the SecureLink blog
We’re expanding the Imprivata family: Welcome, SecureLink!
We’re thrilled to be welcoming SecureLink, the leader in critical access management, to the Imprivata family!
Common risks of digital supply chain transformation
Common risks of digital supply chain transformation
The supply chain is changing. Like many industries — retail, critical infrastructure, healthcare — what was once analog is now digital, and the digital supply chain transformation carries with it new, unimagined risks. 
How user access reviews help organizations achieve SOX compliance
How user access reviews help organizations achieve SOX compliance
Compliance is critical for many organizations. It not only keeps an organization’s valuable data safe, it also protects against fines, lawsuits, and general mismanagement of data. While it varies based on the industry and size of the organization, the cost of non-compliance can be staggering.
Improve third-party vendor security and reduce vendor risk
Improve third-party vendor security and reduce vendor risk
Just one weak link in your supply chain could lead to a potential security disaster. A third-party data breach could cause your organization financial loss, regulatory issues, and damage to your reputation. Here's three easy steps you can take to reduce your third-party vendor risks.
Principle of least privilege benefits
Principle of least privilege benefits
Current cybersecurity and data protection best practices are far beyond the days of just employing a perimeter defense. Threats are coming in from all sides and old castle-and-moat methodologies are outdated and vulnerable. All it takes is a look at the headlines to see how hackers are able to leverage privileged accounts to gain access to critical data.
Image of an abstract web of fingerprints and red lines connecting them
Staving off March (security) madness: Digital identity management is your key defense strategy
I know you don’t really need reminding, but here it is anyway: the security of your organization needs to be top of mind. Always.
Third-party vendor remote access best practices
Third-party vendor remote access best practices
Enterprises should be aware that vendors and employees need to have very different logins and credentials. It’s imperative that businesses have much more granular control over remote vendor access to their networks. Find out more in this post.
What’s the difference between RDP and VPN for remote access?
What’s the difference between RDP and VPN for remote access?
Remote access has become a necessity in business environments. Whether it’s employees working from home or third-party vendors that need to access a customer network, remote access needs to provide secure and reliable connectivity—keyword here being secure.
Okta breach highlights need for third-party security
Okta breach highlights need for third-party security
Chances are you know of, or have even used, Okta. The authentication and identity management software is almost ubiquitous, offering multi-factor authentication for single users across large organizations. Unfortunately, Okta was the subject of a security breach back in January.
Four problems enterprise access solves
Four problems enterprise access solves
Using third parties is nearly inevitable in today’s business landscape. Most organizations need to outsource some of their operations, whether it’s on a large or small scale.
An investment in cybersecurity is an investment in patient care
An investment in cybersecurity is an investment in patient care
Healthcare organizations’ number one priority is patient care. They’re in the business of helping patients, so most of their time, energy, and resources are allocated there. However, cybersecurity is becoming an increasingly important topic for healthcare organizations.