
September 15, 2022
Q2 2022 i1 Assessment Update: Control Requirements Analysis
By Brent Zelinski, Standards Senior Manager, HITRUST Q2 2022 Threat-Adaptive Evaluation for the HITRUST Implemented, 1-Year (i1) Validated Assessment Trending Highlights: Internal Spearphishing (T1534)...

June 23, 2022
On the Horizon: Upcoming Cyber Incident Reporting for Critical Infrastructure Act Introduces New Compliance Requirements
By Donna Steward, Director of Government Affairs, HITRUST Complying with the Cyber Incident Reporting for Critical Infrastructure Act — which was passed into law...

November 30, 2021
HITRUST Threat Catalogue Updates Ransomware Guidance
By Bryan Cline, Ph.D., Chief Research Officer, HITRUST The information security threat landscape is constantly changing. As the technologies and tools that organizations rely...

August 20, 2021
HITRUST Continues to Innovate to Meet Upcoming CMMC Requirements
CMMC Overview The Cybersecurity Maturity Model Certification (CMMC) is a maturity model framework and an acquisition policy initiative launched by the Department of Defense...

March 3, 2020
The HITRUST Shared Responsibility Matrix: The Key to Secure Adoption of Cloud Technologies
By Becky Swain, Director of Standards Development, HITRUST Recognizing who is responsible for what plays an important role in society. For example, knowing the...

November 20, 2017
Cloud Security Myths Busted During Microsoft’s HIMSS Healthcare Security Forum
Written by HITRUST Independent Security Journalist Sean Martin. For many years, covered entities (CEs) and other healthcare providers, throughout North America and beyond, have...

July 5, 2017
The Five Questions to Ask About Your Security Program
Written by Michael Frederick, VP of Operations, HITRUST As board members or senior executives, you are responsible for making governing decisions for all aspects...

March 7, 2019
The Paubox™ HITRUST Journey
Written by Hoala Greevy, CEO, Paubox Our HITRUST journey began eleven months ago when a Fortune 50 company reached out to us. They were...

May 17, 2019
HITRUST’s Contribution to Healthcare’s New ‘Network of Networks’
HITRUST’s Role in the New Trusted Exchange Framework and Connected Agreement (TEFCA) By Anne Kimbol, Chief Privacy Officer, HITRUST The federal government took a...

August 8, 2016
Capitalizing on Analytics Means Protecting, Securing, and Sharing Your Data
By Adam Lorant, VP, Product and Solutions, PHEMI Modern data science and analytics hold the potential to transform healthcare—from helping hospitals operate more efficiently,...

August 8, 2016
The Art and Science of Cost-Effective HITRUST Certification
By Brian Selfridge, Partner, Meditology Services Aligning and certifying with the HITRUST CSF is one of the most efficient means of demonstrating compliance and...

June 7, 2016
Comprehensive Security Assessment or Baseline Security Assessment?
By Ken Vander Wal, Chief Compliance Officer, HITRUST. One of the frequent questions we get from organizations is, “Do we need a comprehensive security assessment...