Comprehensive software reviews to make better IT decisions
PHEMI: A Data Privacy Tool for Healthcare Providers
PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor; thus, allowing such data to be leveraged in multiple use cases without compromising privacy.
Rather than focusing on managing compliance obligations like many other data privacy platforms, PHEMI provides capabilities around maintaining data-subject anonymity while data analysis is taking place.
PHEMI uses a combination of data classification and meta-tagging to indicate data sensitivity and what information needs obfuscating (and to what level) based on who is accessing it. This prevents unnecessary sprawl of sensitive data and limits the potential dangers of data processing.
This feature makes the product particularly useful for healthcare organizations. It allows patient records to be "fully available" to a primary care physician; "mostly available" to consulting physicians; reduced to specific (but non-personal) indicators for researchers; non-personal summaries for data scientists; and tokenized representations for systems administrators.
PHEMI’s industry roots are in healthcare, which is what accounts for the company’s industry-specific marketing. However, this tool could be used by any organization that is conducting data analysis at multiple levels and looking for an easy-to-use solution to protect the privacy of their data subjects. Yet for those in the healthcare space, it doesn’t hurt to have a vendor who is well-acquainted with the data flows of your industry and its unique challenges.
Want to Know More?
By exploiting a five-year-old configuration error, a hacker was able to access Amazon’s S3 cloud storage buckets on which Twilio’s code was loaded. As a result, customers were able to unknowingly download the modified code for twenty-four hours.
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
The beauty of good story telling is its applicability to the most unexpected situations. In 1871, Lewis Carroll wrote about the evil Queen trying to convince Alice to work for her, with a promise of “jam to-morrow and jam yesterday – but never jam to-day.” Little did he know that this one statement would be used by economists, politicians, playwrights, and musicians long after he wrote it – it's time to add data analysts to the list.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
Navigating the vendor risk management space, particularly in the current environment that consists of a mix of cloud, managed services, and critical supply chain, is key to ensuring that you don’t inadvertently introduce new risks through this dynamic channel.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
From employee management through leadership and communication, increased cyber threats, logistics and operations to post-pandemic planning and risk mitigation, the threat landscape has experienced enormous change. These noticeable shifts force us to consider rethinking and retooling how we address risk.