PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor; thus, allowing such data to be leveraged in multiple use cases without compromising privacy.
Rather than focusing on managing compliance obligations like many other data privacy platforms, PHEMI provides capabilities around maintaining data-subject anonymity while data analysis is taking place.
PHEMI uses a combination of data classification and meta-tagging to indicate data sensitivity and what information needs obfuscating (and to what level) based on who is accessing it. This prevents unnecessary sprawl of sensitive data and limits the potential dangers of data processing.
This feature makes the product particularly useful for healthcare organizations. It allows patient records to be "fully available" to a primary care physician; "mostly available" to consulting physicians; reduced to specific (but non-personal) indicators for researchers; non-personal summaries for data scientists; and tokenized representations for systems administrators.
PHEMI’s industry roots are in healthcare, which is what accounts for the company’s industry-specific marketing. However, this tool could be used by any organization that is conducting data analysis at multiple levels and looking for an easy-to-use solution to protect the privacy of their data subjects. Yet for those in the healthcare space, it doesn’t hurt to have a vendor who is well-acquainted with the data flows of your industry and its unique challenges.
The Department of Justice is looking to acquire a GRC tool for the Office of the CIO within the FBI’s Enterprise Information Security Section.
The International Association of Privacy Professionals (IAPP) has released its 2020 Privacy Tech Vendor report, reviewing key software solution vendors within the space. This year’s report highlighted the recent addition of Data Subject Request (DSR) to the feature categories.
In early March, Titus released Titus Illuminate 2020, which was the company’s answer to the question of analyzing data at rest. This latest version of Illuminate leverages machine learning and AI in an effort to manage data that contains potentially sensitive or high-risk personal information.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
“Connected reporting capabilities, control testing, real-time collaboration, cloud-based access, stringent security measure and permissions controls” are considered the leading factors behind CFGI offering Workiva to its clients.
Board International follows the trend of delivering solutions by opening a solution marketplace while strengthening customer trust by getting SOC-2 and SOC-3 certifications.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.