
August 31, 2023
Security and Compliance for the Cloud
There is no arguing that the cloud has changed almost everything about how we do business today. This includes security. As organizations navigate the...

August 29, 2023
How to Mitigate and Manage a Data Breach
A data breach is one of the biggest challenges for organizations. According to Privacy Rights, the US has seen more than 20,000 data breaches...

September 15, 2022
Q2 2022 i1 Assessment Update: Control Requirements Analysis
By Brent Zelinski, Standards Senior Manager, HITRUST Q2 2022 Threat-Adaptive Evaluation for the HITRUST Implemented, 1-Year (i1) Validated Assessment Trending Highlights: Internal Spearphishing (T1534)...

June 23, 2022
On the Horizon: Upcoming Cyber Incident Reporting for Critical Infrastructure Act Introduces New Compliance Requirements
Complying with the Cyber Incident Reporting for Critical Infrastructure Act — which was passed into law in March of 2022 — may present new...

November 30, 2021
HITRUST Threat Catalogue Updates Ransomware Guidance
By Bryan Cline, Ph.D., Chief Research Officer, HITRUST The information security threat landscape is constantly changing. As the technologies and tools that organizations rely...

August 20, 2021
HITRUST Continues to Innovate to Meet Upcoming CMMC Requirements
CMMC Overview The Cybersecurity Maturity Model Certification (CMMC) is a maturity model framework and an acquisition policy initiative launched by the Department of Defense...

March 3, 2020
The HITRUST Shared Responsibility Matrix: The Key to Secure Adoption of Cloud Technologies
By Becky Swain, Director of Standards Development, HITRUST Recognizing who is responsible for what plays an important role in society. For example, knowing the...

July 5, 2017
The Five Questions to Ask About Your Security Program
Written by Michael Frederick, VP of Operations, HITRUST As board members or senior executives, you are responsible for making governing decisions for all aspects...

May 17, 2019
HITRUST’s Contribution to Healthcare’s New ‘Network of Networks’
HITRUST’s Role in the New Trusted Exchange Framework and Connected Agreement (TEFCA) By Anne Kimbol, Chief Privacy Officer, HITRUST The federal government took a...

August 8, 2016
Capitalizing on Analytics Means Protecting, Securing, and Sharing Your Data
By Adam Lorant, VP, Product and Solutions, PHEMI Modern data science and analytics hold the potential to transform healthcare—from helping hospitals operate more efficiently,...

August 8, 2016
The Art and Science of Cost-Effective HITRUST Certification
By Brian Selfridge, Partner, Meditology Services Aligning and certifying with the HITRUST CSF is one of the most efficient means of demonstrating compliance and...

June 7, 2016
Comprehensive Security Assessment or Baseline Security Assessment?
By Ken Vander Wal, Chief Compliance Officer, HITRUST. One of the frequent questions we get from organizations is, “Do we need a comprehensive security assessment...