Blogs

Search
Close this search box.
drug counterfeiting
Anti-Fraud
admin

Preventing drug counterfeiting

Counterfeiting is old as money itself. Drug counterfeiting is no exception. In this post, we’ll share an analytical approach that you can use to estimate

Read More »
patient data leaks
clinical data
admin

Preventing patient data leaks

6 ways to protect patient data in your eClinical and digital health applications Patient data leaks is much more than patient privacy.  Patient data leaks

Read More »
Why SDV sucks
Clinical data management
admin

SDV sucks

How professional services delay cures for patients. Why SDV Sucks In the early 50s of the previous century, nobody knew that 70 years later clinical

Read More »
Clinical data management
admin

The last mile in clinical trials

First mover advantage for clinical trials Although the notion of same day delivery seems to be recent, in fact, competitive advantage always went to those

Read More »

Urban medical legends

Because I was trained as a solid-state physicist I am skeptical of many medical claims – including the efficacy of digital health apps.  Gina Kolata

Read More »

Perverse incentives

The perverse incentive for the high costs of medical devices and delay to market The CRO outsourcing model and high US hospital prices result in

Read More »

WannaCrypt attacks

For your IMMEDIATE notice: If you run medical device Windows management consoles, run Windows Update and update your machine NOW. This is my professional advice

Read More »

Why the Clinton data leaks matter

In the middle of a US Presidential election that will certainly become more contrast-focused (as politically correct Americans like to call mud-slinging), the Clinton data

Read More »

Risk does not walk alone

Israeli biomed companies often ask us about the roles of audit and risk management in their HIPAA security and compliance activities.  At the eHealth conference

Read More »

What is PHI?

Software Associates specialize in HIPAA security and compliance for Israeli medical device companies – and 2  questions always come up: “What is PHI?” and “What is electronically protected

Read More »

The death of the anti-virus

Does anti-virus really protect your data?   Additional security controls do not necessarily reduce risk. Installing more security products is never a free lunch and

Read More »

A new agenda for Israeli education.

הצעה לסדר יום אחר בבית הספר בישראל הזמן – עוד מעט ראש השנה של איזה שנה עברית ששמה לא זכורה למרביתנו. המקום – אי-שם במדינת

Read More »

Software in Medical Devices – Update

We have previously written about various aspects of the software development process, especially, the verification and validation activities in implanted and invasive medical devices. Here is

Read More »

Debugging security

There is an interesting analogy between between debugging software and debugging the security of your systems. As Brian W. Kernighan and Rob Pike wrote in

Read More »

Treat passwords like cash

How much personal technology do you carry around when you travel?  Do you use one of those carry-on bags with your notebook computer on top

Read More »

The megaupload bust

My daughter was distressed yesterday after the Feds shutdown the megaupload file sharing site – “How am I going to see all those series and

Read More »

Clinical trials in the cloud

Ben Baumann from Akaza and Open Clinica fame, recently blogged about clinical trials in the cloud.  Ben is pitching the relatively new offering from Akaza

Read More »

Beyond the firewall

Beyond the firewall – data loss prevention What a simple idea. It doesn’t matter how they break into your network or servers – if attackers

Read More »

Are passwords dead?

A recent article on CSO online ponders the question of whether or not passwords are dead – since they are not much of a security

Read More »