IAM's Role in the Pharmaceutical Sector

Data Breach Today

Sandy Dalal of Allergan on Achieving Security Stability Mergers and acquisitions, along with cloud adoption, are rapidly changing the pharmaceutical industry. Sandy Dalal of Allergan talks about how identity and access management, along with zero trust, are bringing security stability

French pharmaceuticals distribution platform Apodis Pharma leaking 1.7+ TB of confidential data

Security Affairs

The CyberNews investigation team discovered French pharmaceuticals distribution platform Apodis Pharma leaking 1.7+ On November 17, Apodis Pharma closed the database – it is no longer accessible to the public. Who had access to the database?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Is this the year of the patient-centric business model for healthcare?

OpenText Information Management

Industries Healthcare & Life Sciences 2020 predictions biopharma Electronic Medical Records medical devices medtech biotech AI analytics personalized medicine IoMT data platforms data integration Patient Outcomes Patient Centered FDA clinical trials Clinical Applications machine learning Life sciences the internet of things Interoperability Patient-Centric pharmaceutical identity and access management health care

My Health Record: big pharma can apply to access data

The Guardian Data Protection

‘Each application would be assessed on its own merits,’ senators told Pharmaceutical companies will be allowed to apply for data from the controversial My Health Record system, a Senate committee hearing has been told. Caroline Edwards, the deputy secretary of the Department of Health, told the committee third-party access arrangements would allow medical and public health researchers access to de-identified data.

Introducing OpenText Life Sciences Express – it’s simple

OpenText Information Management

That’s exactly what they’re getting with the intuitive user experience and efficient cloud-based access of our new OpenText™ Life Sciences Express. When thinking about quality assurance, numerous employees and partners must access and read standard … The post Introducing OpenText Life Sciences Express – it’s simple appeared first on OpenText Blogs. Simplicity. That’s what every Life Sciences professional working with regulated business processes needs today.

Former Physician Convicted of Criminal HIPAA Violation

Data Breach Today

Case Involved Unauthorized Access to Patient Records A former Massachusetts gynecologist has been convicted in a rare case involving a criminal HIPAA violation. The case was tied to providing a pharmaceutical salesperson access to patients' medical records

What’s new in OpenText Life Sciences Smart View 20.4

OpenText Information Management

With the shift to remote work environments, Life Sciences organizations need a way to provide their workers with secure and compliant access to highly regulated content that is stored on-premises.

Turn on a Dime with a Responsive Data Strategy

Reltio

So, let’s talk about how your data management solution should be ensuring that your data is current and accessible to all those who depend on it – users in marketing, sales, operations, and compliance/regulatory. Business MDM Cloud Partner Posts IQVIA Master Data Management MDM Pharmaceutica

Sales 52

The hidden threats facing your intellectual property

IT Governance

For life sciences and pharmaceutical companies, this includes data on the development and testing of new therapies and details of how therapies are manufactured. In the 2017 WannaCry attack, for example, cyber criminals used ransomware to prevent victims from accessing their IP unless a ransom was paid. Cyber Resilience Healthcare Intellectual Property Life Sciences Pharmaceutical

Business Process Modeling Use Cases and Definition

erwin

This also extends to industry-specific other compliance mandates such as those in healthcare, pharmaceutical and the financial services industries. In this case, a key best practice to consider is the introduction of role/user-based access. This way an organization can ensure only the necessary parties can access such information and ensure they are in keeping with compliance standards. What is business process modeling (BPM)?

68% of Pharma Executives Have Had Credentials Breached Online

Adam Levin

The online credentials for 68% of pharmaceutical executives analyzed for a study have been compromised recently. The study, conducted by cybersecurity firm Blackcloak, found that the email accounts of over two-thirds of pharmaceutical executives had been compromised within the last five to ten years. C-suite executives have been a frequent target for hackers and scammers, but Pierson identified some vulnerabilities specific to the pharmaceutical industry. “In

Implementing a real-time catalog of enterprise data assets

Information Management Resources

Beyond defining access privileges, effective data governance means that companies need to be able to document or label their data assets, much like the labels on pharmaceuticals. Data management Data visualization Data discovery

Chinese hackers stole info from Spanish centers working on Covid19 vaccine

Security Affairs

While pharmaceutical companies worldwide are working on the research of a vaccine for the ongoing COVID19 pandemic, threat actors are conducting cyber espionage campaigns in the attempt of stealing information on the work.

Alleged docs relating to Covid-19 vaccine leaked in darkweb

Security Affairs

While the pandemic is spreading on a global scale, threat actors continue to target government organizations and entities in the pharmaceutical industry. Experts from threat intelligence firm Cyble have found documents relating to Covid-19 vaccine of European Medicines Agency in the Darkweb.

Hackers target COVID-19 vaccine supply chain and sell the vaccine in Darkweb

Security Affairs

Cybercrime organizations continue to be very active while pharmaceutical organizations are involved in the development of a COVID-19 vaccine and medicines to cure the infections.

More Attacks against Computer Automatic Update Systems

Schneier on Security

According to our researchers, the attackers either had access to the source code of the victims' projects or they injected malware at the time of project compilation, meaning they were in the networks of those companies. Also, our experts identified three additional victims: another video gaming company, a conglomerate holding company and a pharmaceutical company, all in South Korea.

Europe’s Largest Private Hospital Operator Fresenius Hit by Ransomware

Krebs on Security

Based in Germany, the Fresenius Group includes four independent businesses: Fresenius Medical Care , a leading provider of care to those suffering from kidney failure; Fresenius Helios , Europe’s largest private hospital operator (according to the company’s Web site); Fresenius Kabi , which supplies pharmaceutical drugs and medical devices; and Fresenius Vamed , which manages healthcare facilities.

[Podcast] How to Conduct a Proof of Concept

AIIM

Also on this episode, hear from John Kain , VP of Consulting Services for Montana and Associates discussing the biggest challenges and opportunities for Intelligent Information Management in the Life Sciences and Pharmaceutical industries. Click here to access our full library of episodes. Reaching your Digital Transformation goals often requires the addition of new software solutions. But, shopping around for software can be a challenge.

Security Affairs newsletter Round 292

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box.

US govt agencies share details of the China-linked espionage malware Taidoor

Security Affairs

In May, the FBI and CISA also warned cyber attacks coordinated by Beijing and attempting to steal COVID-19 information from US health care, pharmaceutical, and research industry sectors. Monitor users’ web browsing habits; restrict access to sites with unfavorable content.

FIN11 gang started deploying ransomware to monetize its operations

Security Affairs

Since August, FIN11 started targeting organizations in many industries, including defense, energy, finance, healthcare, legal, pharmaceutical, telecommunications, technology, and transportation.

Russia-linked APT28 uses COVID-19 lures to deliver Zebrocy malware

Security Affairs

The threat actors used lures consisted of documents about Sinopharm International Corporation, a pharmaceutical company involved in the development of a COVID-19 vaccine and that is currently going through phase three clinical trials.

China-linked APT10 leverages ZeroLogon exploits in recent attacks

Security Affairs

Targeted sectors include: Automotive Clothing Conglomerates Electronics Engineering General Trading Company Government Industrial Products Managed Service Providers Manufacturing Pharmaceutical Professional Services.

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

While it’s impossible to remotely access and tinker with a human brain, it’s currently trivial for a proficient hacker to remotely access and alter just about any piece of software coding. My layman’s understanding is that Sahai’s team arrived at a construct that makes it not so trivial – in fact, virtually impossible – for a malicious party to remotely access and alter any piece of software coding.

NHS data is a goldmine. It must be saved from big tech | James Meadway

The Guardian Data Protection

Over the weekend, it was revealed that US pharmaceutical companies have already been sold data relating to millions of NHS patients and that Amazon, incredibly, has been given free access to NHS data Hidden away in the secret US-UK trade papers, leaked and revealed by Labour in November, is perhaps the biggest single threat to public data yet seen. Health datasets play a vital role in medical research.

NEW TECH: How Semperis came to close a huge gap in Active Directory disaster preparedness

The Last Watchdog

Related: Why Active Directory is so heavily targeted For companies running Microsoft Windows, one such touch-all systems is Active Directory, or AD, the software that organizes and provides access to information across the breadth of Windows systems. Downtime can result in loss of access to line-of-business applications, lost revenue and, in some cases, a complete organizational shutdown.

Benefits of Data Vault Automation

erwin

Let’s take a look at a large global pharmaceutical company that switched to Data Vault automation with staggering results. Like many pharmaceutical companies, it manages a massive data warehouse combining clinical trial, supply chain and other mission-critical data. They needed to accelerate development, as well as aggregate data from different systems for internal customers to access and share.

BEST PRACTICES: Rising complexities of provisioning identities has pushed ‘IGA’ to the fore

The Last Watchdog

Its customer base is comprised of eight of the top 15 banks, four of the top six healthcare insurance and managed care providers, nine of the top 15 property and casualty insurance providers, five of the top 13 pharmaceutical companies, and 11 of the largest 15 federal agencies. Meanwhile, employees, partners, suppliers and customers are using their smartphones to gain access.

List of data breaches and cyber attacks in November 2020 – 586 million records breached

IT Governance

We recorded 103 cyber security incidents in November, which accounted for 586,771,602 leaked records. The majority of those came from a credential-stuffing attack targeting Spotify and a data leak at the messaging app GO SMS Pro, which you can learn more about below.

Hundreds of malicious Chrome browser extensions used to spy on you!

Security Affairs

Malicious Chrome browser extensions were used in a massive surveillance campaign aimed at users working in the financial services, oil and gas, media and entertainment, healthcare, government organizations, and pharmaceuticals. “Passively targeting these applications with malicious browser extensions is akin to the new attacker rootkit—giving the adversary virtually unfettered access to our business and personal online lives.”

New financially motivated attacks in Western Europe traced to Russian-speaking threat actors

Security Affairs

At least two companies operating in pharmaceutical and manufacturing sectors have been affected. If the latter are the ones to blame, this marks the first time the gang has launched the attacks against pharmaceutical and manufacturing companies and may indicate a significant shift in their modus operandi. . FlawedAmmyy , a RAT that provides full access to infected machines, is reported to have been used in some of TA505 recent attacks.

Chronicle experts spotted a Linux variant of the Winnti backdoor

Security Affairs

Chronicle researchers while investigating the cyber attack that hit the Bayer pharmaceutical company in April. “In April 2019, reports emerged of an intrusion involving Winnti malware at a German Pharmaceutical company.” The feature could allow attackers to directly access infected systems when access to the hard-coded control servers is disrupted.

Learn. Transform. Advance.

erwin

The best example I can point to, which underscores the importance and relevance of data, is pharmaceutical companies that have been working at unprecedented speed to develop not only effective treatments for the coronavirus but also vaccines. Learn. Transform. Advance.

China-linked APT41 group exploits Citrix, Cisco, Zoho flaws

Security Affairs

Victims operate in the Banking/Finance, Construction, Defense Industrial Base, Government, Healthcare, High Technology, Higher Education, Legal, Manufacturing, Media, Non-profit, Oil & Gas, Petrochemical, Pharmaceutical, Real Estate, Telecommunications, Transportation, Travel, and Utility. . The vulnerability could be exploited by attackers to access company networks.

Enterprise Architecture: Secrets to Success

erwin

Effective EA is about smarter decision-making, enabling management to make decisions more quickly because they have access to the right information in the right format at the right time. For enterprise architecture, success is often contingent on having clearly defined business goals.

Q&A: The drivers behind the stark rise — and security implications — of ‘memory attacks’

The Last Watchdog

And they can access those things to hide in certain areas. Merck had one of its pharmaceuticals delayed, which led to a global shortage. A distinctive class of hacking is rising to the fore and is being leveraged by threat actors to carry out deep, highly resilient intrusions of well-defended company networks. Related: Memory hacking becomes a go-to tactic These attacks are referred to in the security community as “fileless attacks” or “memory attacks.”

SILENTFADE a long-running malware campaign targeted Facebook AD platform

Security Affairs

The attackers primarily ran malicious ad campaigns, often in the form of advertising pharmaceutical pills and spam with fake celebrity endorsements.” A malware running on an infected endpoint could access cookie store if has the knowledge of its location in the various browsers.

List of data breaches and cyber attacks in October 2020 – 18.4 million records breached

IT Governance

million) Personal data from eatigo accounts accessed in a security incident (2.8 With 117 publicly reported security incidents, October 2020 is the leakiest month we’ve ever recorded. The good news is that those data breaches and cyber attacks accounted for just 18,407,479 breached records.

Highest European Court Confirms: No Presumption of Confidentiality Over Documents Submitted in Marketing Authorization Dossier

Data Matters

This is the first time the CJEU has ruled on this matter, upholding the EMA’s approach to handling access to documents requests. Effectively, the GC’s position has been the same for proactive and reactive disclosure of data held by the EMA, providing for increased access to clinical data. Pharmaceutical companies will continue to ensure that they can provide inclusive data supporting their MA applications while considering how best to preserve their valued know-how.

The Importance of EA/BP for Mergers and Acquisitions

erwin

Industry-specific regulations in areas like healthcare, pharmaceuticals and financial services have been in place for some time. In highly regulated industries like financial services and pharmaceuticals, where mergers and acquisitions activity is frequent, identifying and standardizing business processes meets the scrutiny of regulatory compliance.