<< All Blogs
i1 Assessment and MITRE blog header image

May 19, 2022
i1 Assessment Control Requirements Continue to Meet the Latest Cyberthreats

By Andrew Russell, Vice President of Standards, HITRUST Q1 2022 Threat-Adaptive Analysis: HITRUST Implemented, 1-Year (i1) Validated Assessment The HITRUST i1 Assessment + Certification...

Read More
Blog header image

November 30, 2021
HITRUST Threat Catalogue Updates Ransomware Guidance

By Dominic Boamah, Ph.D., Director, Office of Research & Analysis, HITRUST The information security threat landscape is constantly changing. As the technologies and tools...

Read More
Image for Blog

July 27, 2021
Your Healthcare Third-Party Risk Management Program May Be Overdue for a Check-Up

By Michael Parisi, Vice President, Business Development & Adoption, HITRUST Breaches, ransomware, and other cybersecurity attacks are often introduced through third-party vulnerabilities. Underscoring this...

Read More
TPRM blog image

April 6, 2021
Third-Party Risk Management: A Globally Accepted Approach

By Nikhil Singhvi S Cyber Technology Risk Consultant, Grant Thornton Bharat LLP Today, organizations rely upon third-party service providers to deliver a wide range...

Read More

November 11, 2019
Understanding and Improving the Role of Self-assessments in Third-Party Risk Management

By Dr. Bryan S. Cline, Chief Research Officer, HITRUST Information risk assessments are an integral component of the third-party risk management (TPRM) process, providing...

Read More

June 14, 2016
Cloud Computing: The Good, The Bad and the Scary

Written by HITRUST Independent Security Journalist Sean Martin. Cloud computing can make your organization more cost-effective, more nimble and more capable. Thanks to the...

Read More

Chat Now

This is where you can start a live chat with a member of our team