Blog

‘Pushing the Boundaries’ to Deliver Care Also Stretches Cybersecurity
‘Pushing the Boundaries’ to Deliver Care Also Stretches Cybersecurity
A crisis often brings out the best of the best.
Positive patient identification in the time of COVID-19
Positive patient identification in the time of COVID-19
As the volume of patients seeking medical attention increases during these challenging times, correct patient data is more important than ever.
Provider systems face a new crisis from COVID-19: Staffing
Provider systems face a new crisis from COVID-19: Staffing
Staffing has emerged as one of the most pressing challenges for provider systems dealing with the global COVID-1
Securing a Remote Workforce: Learn How to Protect Your At-Risk Salesforce Data
If you’re switching to a remote work environment, you’ll need to know about securing a remote workforce for maximum data security.
Monthly Cloud Security Roundup: The Least Secure Industry (According to Hackers), the Cybersecurity Skills Shortage, and More
Each month, we bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the acquisition of Vlocity by Salesforce,...
COVID-19: Our house is on fire
COVID-19: Our house is on fire
On my last ER shift, the nurses and I were discussing how all-consuming the COVID-19 crisis is becoming for hospital leadership and front line staff alike...
Monthly Healthcare News Roundup: The Cost of Insider Security Breaches, CTA’s New Healthcare AI Standard, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about the cost of insider security breaches, the Consumer Technology...
Yale New Haven matches workstation locations to clinician logins to help manage Coronavirus
Yale New Haven matches workstation locations to clinician logins to help manage Coronavirus
A message from Dr. Sean Kelly, Chief Medical Officer, Imprivata
The Cost of Insider Threats in the Healthcare Industry and How to Reduce Them
With mounting costs of insider threats in healthcare, how can organizations protect themselves from risks that come from inside?
Monthly Healthcare News Roundup: Microsoft AI for Health Initiative, 2020 Predictions for Cyberattacks, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about Microsoft’s new AI for Health Initiative, health IT professionals’...
The NIST Privacy Framework: How to Mitigate Risk and Align Security Efforts
Discover how the new NIST Privacy Framework aligns with the Cybersecurity Framework to simplify your compliance, security, and privacy efforts.
Imprivata OneSign 7.1 Introduces Secure Walkaway Technology
Imprivata OneSign 7.1 Introduces Secure Walkaway Technology
Imprivata, the healthcare digital identity company, has been at the forefront of digital transformation in healthcare.
Considerations in your IAAM journey – Final (Part IV): Why take the risk of integration?
Considerations in your IAAM journey – Final (Part IV): Why take the risk of integration?
Before you read, catch up on Part 0: An IAAM system overview,
Considerations in your IAAM journey - Part III: What should I manage in my IDG system?
Considerations in your IAAM journey - Part III: What should I manage in my IDG system?
Before you read, catch up on Part 0: An IAAM system overview and
Considerations in your IAAM journey - Part II: Role Based Access Control the Unicorn of IAAM…or is it?
Considerations in your IAAM journey - Part II: Role Based Access Control the Unicorn of IAAM…or is it?
Before you read, catch up on Part 0: An IAAM system overview and
Monthly Cloud Security Roundup: NIST’s New Privacy Framework, Salesforce’s Call for a National Data Privacy Law, and More
Discover the latest cloud security news with January’s roundup, including NIST’s new Privacy Framework and Salesforce’s call for a national data privacy law.
Considerations in your IAAM journey - Part I: Who does what
Considerations in your IAAM journey - Part I: Who does what
In case you missed part 0 in this series, you may want to brush up on 
Considerations in your IAAM journey - Part 0: An IAAM system overview
Considerations in your IAAM journey - Part 0: An IAAM system overview
I’m sure you’re well aware that IAM stands for Identity and Access Management, so you’re probably wondering why I’m calling this an IAAM journey.
The NIST Privacy Framework: How Does It Compare to the Cybersecurity Framework?
The new NIST Privacy Framework is designed to help organizations improve individuals’ privacy through enterprise risk management.
3 Key Learnings from the Gartner IAM Summit
3 Key Learnings from the Gartner IAM Summit
I recently had the opportunity to attend the 2019 Gartner Identity & Access Management (IAM) Summit in Las Vegas.