Knowledge Prostitution in clinical data

clinical data

Friday, a client asked me about privacy, data security and social networking in clinical trials. The client told me that they were considering using a physicians‘ portal to market their digital therapeutic product after they completed their pivotal clinical trial.  (See my article on 4 strategies to get FDA approval for your medical device ).  […]

How understanding culture reduces risk in your clinical trials

GCP risk

It’s during the war the Russians are waging on Ukraine and I got on a thread on a blog about why Putin is so violent. I replied that from Putin’s perspective – the US and Europeans represented an existential threat to him when they pull Ukraine into NATO and when the US pushes democracy eastwards. […]

A word to Teva on firing employees and assuring data security

To be able to do something before it exists, sense before it becomes active, and see before it sprouts. The Book of Balance and Harmony (Chung-ho chi). A medieval Taoist book In early December 2017, the Israeli pharmaceutical generics company Teva announced it would lay off about 1,700 of its employees in Israel, who make up […]

ניהול אבטחת מידע בענן – על תבונה ורגישות

ניהול אבטחת מידע בענן – על תבונה ורגישות ,ממשל נתונים הוא דרישה הכרחית להגנה על נתונים כשעוברים למחשוב בענן. קביעת מדיניות ממשל נתונים היא בעלת חשיבות מיוחדת במודל העבודה של מחשוב ענן שמבוסס על אספקת שירותים בתשלום ליחידת צריכה, בניגוד למודל המסורתי של מערכות מידע המבוסס על התקנה, שילוב מערכות ותפעול מוצרים. יחד עם ההיצע […]

Small business data security

Here are 7 steps to protecting your small business’s data and and intellectual property in 2011 in the era of the Obama Presidency and rising government regulation. Some of these steps are about not drinking consultant coolade (like Step # 1- Do not be tempted into an expensive business process mapping project) and others are adopting best practices […]

How to assess risk – Part II: Use attack modeling to collect data

In my article – “How to assess risk – Part I: Asking the right questions”, I talked about using attack modeling as a tool to collect data instead of using self-assessment check lists. In this article, I’ll drill down into some of the details and provide some guidelines on how to actually use attack modeling […]

Professional skill sets

We spent the past week in Tzfat  (Safed) – situated in the northern part of Israel and with a 900meter elevation, the weather is cool and dry and a welcome relief from the humidity and heat of Tel Aviv. We met a couple at dinner one evening – the husband is a retired aerospace software […]

The threat behind the House Tri-Committee Bill on Health Care

Don’t ask me why, but I was invited (and joined) the Pakistan Networkers group on LinkedIn.  I see all kinds of cool job opportunities in the Emirates which I can’t really take but the traffic is interesting. I saw this picture in a post today from the Pakistan Networkers group. It graphically describes the complexity […]

Are you a leader or a friend?

Although I served in the Israeli Army – I was what they called a “simple soldier”, a communications tech in a van. Our officer was glad that we kept things working – and that was fair enough we thought. After grad school, serving in the armies of high-tech samurai, I learned that commanders fight with […]