The search found 3766 results.
Blog
The cyberattack on Colonial Pipeline Co. and similar recent attacks such as the SolarWinds breach (which impacted several government agencies) revealed major vulnerabilities in government cybersecurity protocols and critical infrastructure systems, resulting in immediate action to be taken by the White House.
Blog
Remote access and connecting into customers' networks are often overlooked vectors of risk. As a value-added reseller (VAR), your company alone may provide any or all of these connections to your customers:
Blog
If you have any involvement with government entities and operations, chances are you’ve heard of CJIS compliance. It’s the largest division of the FBI and the primary source of information and services for all law enforcement, national security, and intelligence community partners.
Blog
“We had a large manufacturing company come to us looking to solve their third-party access problem after discovering a virus within their OT environment,” says Rob Palermo, VP of Product Management at SecureLink. “One of the first steps they took was to disable VPNs being used by third parties.
Blog
Stolen or compromised credentials are often responsible for damaging hacks. Learn how compromised passwords can lead to data breaches. Read the blog.
Blog
In this blog post, we'll explore exactly what a man-in-the-middle attack is - and how you can prevent this kind of attack happening to you.
Blog
As a technology vendor, your number one goal is to provide the best service possible to your customers. The enterprises you support likely rely on you for pretty critical business functions, like operating machinery or storing confidential patient or client information.
Blog
Discover the common VPN security risks and learn how to protect your network. Learn how Imprivata Vendor Privileged Access Management can solve your VPN problems.
Blog
Take a moment to think about the fallout of a government data breach. Security systems threatened. Federal departments, like the Treasury and State departments, compromised. Constituents’ trust displaced. Unfortunately, this was a reality for the U.S. government in late 2020.
Blog
Imprivata's mission is to make third-party remote access as comprehensive and powerful as possible. To achieve this, our product integrates with a number of other cybersecurity programs and applications to make our customer’s experience as secure and efficient as possible.