<< All Blogs

July 31, 2023
Implementation for Health3PT Recommended Practices

By Robert Booker, Chief Strategy Officer, HITRUST HITRUST is pleased to join with healthcare industry leaders who are working together through Health3PT to boldly...

Read More

June 22, 2023
3 Key Steps for Effective TPRM

By Robert Booker, Chief Strategy Officer, HITRUST Healthcare organizations rely on complex networks of vendors. Together, healthcare companies and their vendors support care delivery,...

Read More
blog hero image

February 20, 2023
Artificial Intelligence Powered HITRUST CSF Version 11 Release

By Andrew Russell, Vice President of Standards, HITRUST AI-based Standards Tooling Developed by HITRUST Accelerates Regulations and Standards Updates in the CSF Framework, Reduces Compliance...

Read More
blog hero image

January 24, 2023
Power of the Portfolio

By Robert Booker, Chief Strategy Officer, HITRUST HITRUST Focus on Continuous Improvement HITRUST has been dedicated to measuring and improving security maturity with accuracy,...

Read More
blog image

September 2, 2022
TPRM is Broken: Healthcare’s Unsustainable Approach to Third-Party Vendor Risk Management

By Britton Burton, Senior Director of Product Strategy at CORL Technologies, and Ryan Patrick, Vice President of Adoption at HITRUST HITRUST and CORL Technologies...

Read More
CISA blog header image

June 23, 2022
On the Horizon: Upcoming Cyber Incident Reporting for Critical Infrastructure Act Introduces New Compliance Requirements

Complying with the Cyber Incident Reporting for Critical Infrastructure Act — which was passed into law in March of 2022 — may present new...

Read More
ROI blog header image

June 14, 2022
A Guide to Examining the Return on Investment (ROI) for a HITRUST Certification

By Tom Glaser, Practice Lead and Security Assessor, RSI Security “Why did we ask the IT security auditor to cross the road? … Because...

Read More
i1 Assessment and MITRE blog header image

May 19, 2022
i1 Assessment Control Requirements Continue to Meet the Latest Cyberthreats

By Andrew Russell, Vice President of Standards, HITRUST Q1 2022 Threat-Adaptive Analysis: HITRUST Implemented, 1-Year (i1) Validated Assessment The HITRUST i1 Assessment + Certification...

Read More
Blog header image

November 30, 2021
HITRUST Threat Catalogue Updates Ransomware Guidance

By Bryan Cline, Ph.D., Chief Research Officer, HITRUST The information security threat landscape is constantly changing. As the technologies and tools that organizations rely...

Read More
TPRM blog image

April 6, 2021
Third-Party Risk Management: A Globally Accepted Approach

By Nikhil Singhvi S Cyber Technology Risk Consultant, Grant Thornton Bharat LLP Today, organizations rely upon third-party service providers to deliver a wide range...

Read More

November 11, 2019
Understanding and Improving the Role of Self-assessments in Third-Party Risk Management

By Dr. Bryan S. Cline, Chief Research Officer, HITRUST Information risk assessments are an integral component of the third-party risk management (TPRM) process, providing...

Read More

June 14, 2016
Cloud Computing: The Good, The Bad and the Scary

Written by HITRUST Independent Security Journalist Sean Martin. Cloud computing can make your organization more cost-effective, more nimble and more capable. Thanks to the...

Read More

Chat Now

This is where you can start a live chat with a member of our team