The search found 3762 results.
Blog
Access governance is crucial when it comes to securing an organization’s critical access points and assets. But access governance alone isn’t enough. To add another, important, layer of security and mitigate mounting cyber threats, an organization needs to add friction and visibility as well as reduce risks when it comes to access rights.
Blog
Patient Lily Johnson lies in her hospital bed, waiting for Dr. Barlow to write her discharge orders. She is tired. Hospitals are exhausting places where it’s nearly impossible to get a good night’s sleep. Activity swirls around her but none of it seems meaningful to her. She thought she was going home today. Dr. Barlow had come in on his morning rounds and told her she could go home. But although she calls out to the nurses who pass by her door, she can’t get any definitive time. So she waits.
Blog
As a Director of Engineering at Imprivata, I recently participated in a three day recruiting trip to three universities. The goal of the trip was for about 10 high tech companies to visit a few of the top engineering schools to facilitate new talent injection. The visit included University of Michigan, Carnegie Mellon University and Cornell University. The corporate participants included a number of very early startups and a few later stage companies like Imprivata.
Blog
For any business accepting, processing, storing, or transmitting credit card information, PCI DSS compliance should be at the top of its must-do list. The Payment Card Industry Data Security Standard is a set of rules established to create a secure environment within all companies that accept credit card payments.
Blog
Zero Trust Network Access (ZTNA) is everyone's favorite buzzword these days, particularly with security vendors hawking their products. It has become a popular catchphrase describing a next-generation security practice that was formalized by Gartner and implemented by Google in their BeyondCorp concept years later.
Blog
Remote access has become an irreplaceable tool for the success of many companies, but using it safely and securely is difficult.
Blog
What is data blocking, and what do the ONC and CMS's proposed rules mean for healthcare privacy, security, and interoperability?
Blog
Why simplified mobile access is the key to happier clinicians and better patient outcomes.