The search found 3762 results.
Blog
The manufacturing sector continues to be one of the most appealing targets for hackers. It has the largest average payout for a ransomware attack and the consequences are too visible and disruptive to ignore. The result: companies are much more likely to pay ransoms and meet demands.
Blog
As a business grows, its team gets really busy, which is the case at Imprivata FairWarning since our founding. Anyone who has hired people knows that there is a tendency to make “hires of convenience” when...
Blog
The recent spate of high-profile security breaches across the healthcare industry has revealed a shift in how attackers are accessing and pilfer patient records and other sensitive information. Most healthcare organization leaders I speak with have taken steps to reinforce their perimeter defenses with firewalls, intrusion detection, deep packet inspection, and other strategies.
Blog
If you work in the cybersecurity field, or if you’ve ever worked from home, you’re probably pretty familiar with a virtual private network, or as we all know them, a VPN. VPNs offer a method of secure remote access connection between users and a private corporate network.
In other words, it gives you the access you need to files (or anything else) that are found locally on a server, but from the comfort of your home (or airport, coffee shop, or anywhere in between).
Blog
The European Union General Data Protection Regulation or GDPR goes into effect May 2018, making 2018 a watershed year globally in the battle over the future of privacy. Soon, the United States’...
News
As Imprivata’s VP of Worldwide Engineering, Cyber, Joel Burleson-Davis is responsible for overseeing teams in the organization that build and deliver cybersecurity solutions. Prior to joining Imprivata, he was an engineering manager in Sydney, Australia for 6 years. He holds a master’s degree in liberal arts from St. Edward’s University where his focus was on philosophy and behavioral sciences applied to technology.
Whitepaper
Cyber security strategy is a war zone: you need a battle plan. This whitepaper offers C-Suite cyber security proactive military, managerial, and technological strategies to combat the danger of passwords within their organization, and tools to understand and engineer the social behaviors of employees that hackers prey upon so successfully.