The search found 3762 results.
News
As organizations across all sectors face an increasing volume of cyber-attacks, CISOs must continue to perform a careful balancing act – protecting their organization’s systems while implementing security measures that don’t overly inconvenience or disrupt employees. Nowhere is this truer than in the realm of user authentication and password management. If authentication requirements are too simple, cyber-criminals can easily overcome them. However, too complex, and employees will simply ignore or try to bypass them. After all, it’s human nature to prioritize convenience over security.
Blog
#ViVEvent 2025 will take place in Nashville, TN, February 16-19, and we’re getting ready!This year’s agenda is packed with thought-provoking sessions and discussions on topics like AI, mobile transformation, cybersecurity, passwordless authentication, and more.
News
A Ponemon Institute report shows where healthcare providers waste the most time and energy.
News
Imprivata CEO Gus Malezis tells Sarah he believes his Thoma Bravo-backed company is building out an essential digital identity technology framework for health care.
Why it matters: Doctors and nurses need access to hundreds of applications to care for patients, but patient privacy laws and cybersecurity threats make that increasingly complex.
Read the full article at www.axios.com
Blog
Enacted into law in 1996, the Health Insurance Portability and Accountability Act (HIPAA) includes five sections detailing data privacy and security provisions for safeguarding protected health information (PHI). Failure to comply with HIPAA can result in civil and criminal penalties. If a healthcare organization is unaware that its practices led to a HIPAA violation, the minimum civil penalty is $100 per violation, with an annual maximum of $25,000 for repeat violations. The maximum civil penalty is $50,000 per violation with an annual maximum of $1.5 million.
Blog
If a hacker gets access to your privileged accounts they can move around your network, applications and equipment. Malicious actors can steal your data, as well as delete it, modify it and change your settings or create persistent backdoors into your network. For any company (just ask Marriott/Starwood), the risk is significant – stolen user information, loss of intellectual property and damage to your brand. Not to mention possible regulatory fines, lawsuits, etc.
Blog
And why many CIOs are choosing managed services to bridge the IT resource gap and boost security.
Partner
10ZiG Technology’s 20+ year sole focus on intuitive, secure, and cost-effective endpoint solutions, including hardware, operating systems (Linux and Windows 11 IoT), repurposing software, and endpoint management, is changing the game for endpoint delivery in VDI, and DaaS environments. Leveraged by longstanding partnerships with Imprivata, Omnissa, Citrix, Microsoft and more, 10ZiG offers a diverse selection of traditional, mobile, and all-in-one endpoints that support organizations of any size with endpoint delivery strategy.