Drug Diversion – Can AI Monitoring Solve This Growing Issue?
January 20, 2023
Although often overshadowed by major news and events, drug diversion – the rerouting of medications intended for patients by healthcare staff and is actually…
COVID-19 surge readiness: use cases demonstrating how hospitals leveraged digital identity access management for infection control and pandemic response
January 6, 2023
Background Surging volumes of patients with COVID-19 and the high infectiousness of SARS-CoV-2 challenged hospital infection control/safety,…
Outsourcing’s dark side: How to stop the surge of supply chain attacks
January 6, 2023
It’s an increasingly familiar scenario. A well-regarded company offering a popular online service discloses that it has fallen victim to a data breach.…
Go Password-less. It’s Not Just Possible It’s Desirable
December 28, 2022
Password complexity is one of the most cost effective and simple ways for organizations to improve security. It’s widely embraced across industries and often…
Cybersecurity: Trends From 2022 and Predictions For 2023
December 28, 2022
As our home networks continue to merge with the enterprise, and as enterprises across all industries become more dispersed, cybersecurity threats increase.…
Single Sign-on: It's only as good as your ability to use it
December 20, 2022
Because they are dependent on dozens of highly technical processes, modern factories can't afford to let security burden end users who rely on technology.…
The BarCode Podcast: Chain of Disruption with Joel Burleson-Davis
November 21, 2022
As Imprivata’s VP of Worldwide Engineering, Cyber, Joel Burleson-Davis is responsible for overseeing teams in the organization that build and deliver cyberse…
Why Third-Party Risk Should Be Manufacturing's Top Priority
November 7, 2022
The Fourth Industrial Revolution created a new digital world for manufacturers — one requiring greater connectivity, agility, and efficiency than ever before…
Cybersecurity mesh: Healthcare’s foundation for a strong ZTA
October 10, 2022
One of the most popular analyst terms in 2022, cybersecurity mesh is a defense method for securing each device and critical access points with their own secu…