March 3, 2020
The HITRUST Shared Responsibility Matrix: The Key to Secure Adoption of Cloud Technologies

By Becky Swain, Director of Standards Development, HITRUST Recognizing who is responsible for what plays an important role in society. For example, knowing the...

Read More

November 20, 2017
Cloud Security Myths Busted During Microsoft’s HIMSS Healthcare Security Forum

Written by HITRUST Independent Security Journalist Sean Martin. For many years, covered entities (CEs) and other healthcare providers, throughout North America and beyond, have...

Read More
image for The Five Questions About Your Security Program

July 5, 2017
The Five Questions to Ask About Your Security Program

Written by Michael Frederick, VP of Operations, HITRUST As board members or senior executives, you are responsible for making governing decisions for all aspects...

Read More

March 7, 2019
The Paubox™ HITRUST Journey

Written by Hoala Greevy, CEO, Paubox Our HITRUST journey began eleven months ago when a Fortune 50 company reached out to us. They were...

Read More

May 17, 2019
HITRUST’s Contribution to Healthcare’s New ‘Network of Networks’

HITRUST’s Role in the New Trusted Exchange Framework and Connected Agreement (TEFCA) By Anne Kimbol, Chief Privacy Officer, HITRUST The federal government took a...

Read More

August 24, 2018
New National Risk Management Center to Help Combat Cybersecurity

Details forthcoming in new Department of Homeland Security initiative Written by Carl Anderson, Chief Legal Officer & Senior Vice President of Governmental Affairs, HITRUST...

Read More

August 8, 2016
Capitalizing on Analytics Means Protecting, Securing, and Sharing Your Data

By Adam Lorant, VP, Product and Solutions, PHEMI Modern data science and analytics hold the potential to transform healthcare—from helping hospitals operate more efficiently,...

Read More

August 8, 2016
The Art and Science of Cost-Effective HITRUST Certification

By Brian Selfridge, Partner, Meditology Services  Aligning and certifying with the HITRUST CSF is one of the most efficient means of demonstrating compliance and...

Read More

June 7, 2016
Comprehensive Security Assessment or Baseline Security Assessment?

By Ken Vander Wal, Chief Compliance Officer, HITRUST. One of the frequent questions we get from organizations is, “Do we need a comprehensive security assessment...

Read More

December 7, 2016
Information Security Awareness Beyond Technical Safeguards

By Wes Rhea, CCO and PSO, BioIQ. The majority of healthcare organizations have the ability to protect their sensitive information via technology. Firewalls, intrusion prevention...

Read More

Chat Now

This is where you can start a live chat with a member of our team