The search found 4254 results.
Imprivata Partners HP and IGEL Technology to Integrate Strong Authentication Directly into Thin and Zero Client Devices to Help Organizations Optimize Roaming Desktop Capabilities
This year at HIMSS16, we hosted a cybersecurity panel discussion in the Imprivata theater on "Protecting health information: thinking beyond cybersecurity." Moderated by Anthony Guerra, editor-in-chief of healthsystemsCIO.com, the panel included health IT and security experts:
Enterprise organizations around the world rely on third-party software applications to keep their businesses running both securely and efficiently. These necessary relationships between enterprises and vendors, however, are known to be risky because they are a top attack vector for hackers.
Lexington, Mass.—May 6, 2015—Imprivata® (NYSE: IMPR), the healthcare IT security company, today announced that CTO David Ting will lead a discussion about the Internet of Things in healthcare, including the associated data security and user authentication challenges, during Citrix Synergy (May 12-14, 2015 in Orlando, Fla.). The session will focus on the benefits of creating a network of IP-connected computers, sensors, and devices in which care providers and patients can share information.
A quick look around at the vendors exhibiting at the VMworld 2013 conference in San Francisco this week seems to confirm the belief that the move to cloud computing is inevitable (a notion supported by a number of different studies).
I was reading about the recent access management related breach at the California Water Services Company, where an auditor resigned, but illegally accessed computer systems to steal more than $9 million before leaving. While the company should be lauded for catching the fraud before the wire transfers could go through and irreparable damage could be done, it should serve as another cautionary tale in what has become a recurring theme on the application security front. This is just one more saga in an every growing litany of tales of breaches that we’ve hearing about.
Back in January, I shared some of my observations on 2009 Priorities for identity management in the new economic reality people are faced with - productivity, security and manageable IT projects. This year’s economics have forced people to do more with less, manage tighter budgets and maintain enterprise security while dealing with re-orgs and layoffs. While 2008 was the worst year to date for data breaches, 2009 hasn’t been much better if you look at this chronology of data breaches, including the recently disclosed incident at Goldman Sachs. The Identity Theft Resource Center keeps tabs as well, and has a nice snapshot of high-profile data breaches. Many of these are the result of unauthorized access, some combined with placing malicious code on servers or laptops to siphon off data. It’s amazing the methods that are being used to access systems, steal data, sometimes extort money and always damage reputations. Potential impact of the Goldman Sachs’s unauthorized upload of proprietary software is still under investigation, but information on how easy it was to pull off makes for scary reading. Given the potential impact of data breaches, there has been significant progress made to tighten access to systems, so let’s review some of the relevant things that are happening in identity management. Following are three areas, I believe, we need to watch for in the latter half of 2009...
Khalid Kark of Forrester Research recently issued a useful whitepaper that outlines the security reforms needed to improve patient data security in the healthcare industry. The whitepaper highlights four key reasons why healthcare organizations are failing behind on security. Khalid provides a comprehensive set of recommendations to help healthcare organizations address these challenges – these are near and dear to what we do here every day. I thought I would share some of the insights gathered from work with our many healthcare customers.
Security expert Bruce Schneier pulls out an interesting excerpt from an essay “When Security Gets in the Way” that is sparking great discussion on his Schneier on Security blog. The essay, from Don Norman’s jnd site, debates security vs. usability, and addresses design considerations for enterprise security systems. This article captures important concerns often discussed in security circles on how to make security stronger without disrupting user behavior. It’s a delicate balance – we often say the most secure computer is the one in a locked room not powered up but that would hardly be usable. At Imprivata we have always believed that usability and security don’t need to be mutually exclusive.