The search found 3760 results.
Blog
There are three main components of an identity and access management (IAM) strategy: identity governance and administration, access management (including privileged access management), and adaptive multifactor authentication.
Webinar
Ransomware attacks have seen year-on-year growth, with no signs of slowing down. And cybercriminals are using new ransomware tactics, while also diversifying their target industries. The financial consequences of a ransomware attack are enough to put any organization on edge – and if it isn’t, you haven’t been paying attention. According to Sharkstriker, there have been an estimated 2.3 billion ransomware attacks in 2022, an 80% increase since 2021 (Zscaler, 2022).
Blog
Companies continue to heavily rely on third-party vendors to manage mission-critical business functions. These applications may be cloud-based (SaaS) or deployed on-premises and they are often accessed remotely via different devices.
Blog
Companies of all sizes often turn to virtual private networks, or VPNs, for a critical layer of data security. These solutions are used to protect user-information that's transferred via internet connections from unauthorized access.
Blog
Departing employees can create a lot of challenges for an organization. So what are the signs your employee is about to quit?
Blog
As healthcare’s digital age continues, the importance of cybersecurity cannot be overstated. With each passing year, cyber threats continue to evolve and pose new challenges. Let’s explore the top cybersecurity trends to watch out for in the healthcare industry in 2024.
Blog
Best practices for a mature privacy monitoring program are based in three key phases that build upon one another, and quickly progress in scope and sophistication. Read our blog recapping the on-demand webinar: 3 key steps to achieve a mature monitoring program
Datasheet
SecureLink Enterprise Access provides the means to meet NIST’s security recommendations with regards to your third parties’ access. With individual identity management, granular control over vendor access, and detailed audit trails that log all activity, Imprivata will be a valued partner in helping you mitigate the risks of third-party access and meet the recommendations in the Cybersecurity Framework.