The search found 3766 results.
Blog Post
A look into the trends forecasted by the biggest influencers in the cybersecurity community - here's the top four for 2016.
Blog Post
As manufacturers modernize, common infrastructure is becoming the foundation of the digital factory. Learn the five key benefits driving productivity, security, and resilience across modern manufacturing environments
Blog Post
Critical industries are reaching a technological inflection point. As healthcare, public safety, and manufacturing rapidly modernize, 2026 is poised to cement trust, identity, and intelligent automation as the core drivers of resilience and efficiency. AI is accelerating operational change, the workforce is becoming increasingly mobile, and cyber threats are evolving faster than legacy systems can respond.
Blog Post
As HIMSS19 ramps up, there are always far more sessions than any one person has time to attend. Here are the top HIMSS19 sessions we're most excited for at Imprivata FairWarning, including a few hot topics...
Blog Post
The manufacturing industry, like so many others, is undergoing massive change. With the introduction of technologies like 3D printing, Internet of Things (IoT) and Industrial Internet of Things (IIoT), companies have been able to disrupt the industry extremely quickly with creative ways to manufacture products. However, these new tools, increasingly connected to global networks, have created heightened vulnerabilities to cyberattacks.
Blog Post
As healthcare providers continue to invest in electronic medical records, protecting patient identity and maintaining the integrity of patient records are their top priority. In a recent webinar hosted by The Healthcare Financial Management Association (HFMA), David Feldman, SVP and CMO at Hospitals Insurance Company (HIC), Jim Schwamb, former VP, Patient Financial Services at BayCare Health System in Clearwater, FL, and David Wiener, GM of Imprivata PatientSecure Products Group, highlighted the challenges posed by commonly practiced patient identification processes, and discussed best practices for positive patient identification to improve revenue cycle efficiency and patient safety.
News
Healthcare organizations are giving their providers the ability to text each other, but security remains a challenge.
Blog Post
Learn what user access reviews are, the risks of not reviewing user access, and recommended user access review best practices. Read the blog.
Blog Post
Managing vendor access into your network and systems is becoming a more critical job as news about third-party breaches seems to break almost daily and regulatory focus on third-party risk is intensifying.