The search found 3759 results.
News
As cyber threats escalate and budgets tighten, security discussions are increasingly shifting away from predicting the next big thing and toward identifying what delivers real, measurable results. With ransomware attacks rising across sectors and global cyber insurance premiums increasing by 15-20% year-over-year, boards are pressuring CISOs to demonstrate measurable returns on every dollar spent.
News
Cybersecurity Leaders Urge Action as CISA 2015 Expiration Creates Gaps in Cyber Intelligence Sharing
Critical infrastructure industries are facing new uncertainty following the recent expiration of the Cybersecurity Information Sharing Act of 2015 (CISA 2015).
Blog
For decades, organizations have poured resources into securing systems with stronger and more complex passwords. Yet despite this investment, passwords remain one of the weakest links in cybersecurity and one of the biggest drains on workforce productivity.
News
The expiration of the Cybersecurity Information Sharing Act of 2015 (CISA 2015) on September 30 has left healthcare delivery organizations (HDOs) navigating new uncertainty in an already volatile threat landscape.
News
Despite years of investment in cybersecurity awareness training, complex password policies, and multifactor authentication (MFA), human error remains a top cause of data breaches. According to IBM’s Cost of a Data Breach Report, 90% of successful cyberattacks and 70% of data breaches originate at endpoint devices, often triggered by employee workarounds under pressure to move fast.
Blog
As organizations accelerate IT/OT integration, they face new security risks tied to legacy systems, shared logins, and misaligned priorities. Here’s a checklist of top concerns to address when bringing IT and OT environments together.Integrating IT and OT systems enables manufacturers to connect data, devices, and workflows, resulting in more efficient operations. Done right, it powers real-time decision-making, predictive maintenance, and smarter supply chains. But without proper security, IT/OT integration can introduce more risk than resilience.
Blog
Patient misidentification is a leading cause of medical errors, fueling patient harm, denied claims, and unnecessary costs. By focusing on prevention rather than correction, organizations can ensure patient safety and stronger financial performance.
Blog
How do you implement desktop virtualization in a way that speeds care provider adoption and enhances patient care? Combine strong authentication and single sign-on from Imprivata OneSign with Citrix XenDesktop.
In a new white paper, Virtual Desktops in Hospitals: Streamlining Clinical Workflows, Citrix describes common clinical use case and tips for managing the transition to virtual desktops.
Blog
I know where I’ll be, at Imprivata HealthCon! The Imprivata HealthCon 2012 User Conference kicks off with an evening event on Tuesday, November 6th followed by two days of Healthcare IT sessions on topics such as EMR Adoption, HIPAA/HITECH compliance and Stage 2 Meaningful Use.