The search found 3836 results.
Blog Post
Stolen or compromised credentials are often responsible for damaging hacks. Learn how compromised passwords can lead to data breaches. Read the blog.
Blog Post
In this blog post, we'll explore exactly what a man-in-the-middle attack is - and how you can prevent this kind of attack happening to you.
Blog Post
As a technology vendor, your number one goal is to provide the best service possible to your customers. The enterprises you support likely rely on you for pretty critical business functions, like operating machinery or storing confidential patient or client information.
Blog Post
Discover the common VPN security risks and learn how to protect your network. Learn how Imprivata Vendor Privileged Access Management can solve your VPN problems.
Blog Post
Take a moment to think about the fallout of a government data breach. Security systems threatened. Federal departments, like the Treasury and State departments, compromised. Constituents’ trust displaced. Unfortunately, this was a reality for the U.S. government in late 2020.
Blog Post
Imprivata's mission is to make third-party remote access as comprehensive and powerful as possible. To achieve this, our product integrates with a number of other cybersecurity programs and applications to make our customer’s experience as secure and efficient as possible.
Blog Post
When you think about providing remote access to your network, VPNs and desktop sharing are the two most frequently used methods. VPNs are great for allowing access to local resources, but they present challenges for access for third-party vendors.
Blog Post
News broke recently that a water plant in Florida, which provides water to businesses and around 15,000 residents, was permeated by a hacker. The hacker increased the amount of sodium hydroxide in the water treatment system to more than 10,000% of the normal ratio.
Blog Post
Enterprise organizations around the world rely on third-party software applications to keep their businesses running both securely and efficiently. These necessary relationships between enterprises and vendors, however, are known to be risky because they are a top attack vector for hackers.
Blog Post
Way back in 2018, we conducted a survey that found that for every technology vendor there are 239 customers who rely on their support. Sure, you're probably thinking that 2018 happened so long ago that you don't even remember what was going on before then, right?