<< All Blogs

August 31, 2023
Security and Compliance for the Cloud

There is no arguing that the cloud has changed almost everything about how we do business today. This includes security. As organizations navigate the...

Read More

August 29, 2023
How to Mitigate and Manage a Data Breach

A data breach is one of the biggest challenges for organizations. According to Privacy Rights, the US has seen more than 20,000 data breaches...

Read More
i1 Assessment blog

September 15, 2022
Q2 2022 i1 Assessment Update: Control Requirements Analysis

By Brent Zelinski, Standards Senior Manager, HITRUST Q2 2022 Threat-Adaptive Evaluation for the HITRUST Implemented, 1-Year (i1) Validated Assessment Trending Highlights: Internal Spearphishing (T1534)...

Read More
CISA blog header image

June 23, 2022
On the Horizon: Upcoming Cyber Incident Reporting for Critical Infrastructure Act Introduces New Compliance Requirements

Complying with the Cyber Incident Reporting for Critical Infrastructure Act — which was passed into law in March of 2022 — may present new...

Read More
Blog header image

November 30, 2021
HITRUST Threat Catalogue Updates Ransomware Guidance

By Bryan Cline, Ph.D., Chief Research Officer, HITRUST The information security threat landscape is constantly changing. As the technologies and tools that organizations rely...

Read More
tall buildings with shadow of binary code on the side

August 20, 2021
HITRUST Continues to Innovate to Meet Upcoming CMMC Requirements

CMMC Overview The Cybersecurity Maturity Model Certification (CMMC) is a maturity model framework and an acquisition policy initiative launched by the Department of Defense...

Read More

March 3, 2020
The HITRUST Shared Responsibility Matrix: The Key to Secure Adoption of Cloud Technologies

By Becky Swain, Director of Standards Development, HITRUST Recognizing who is responsible for what plays an important role in society. For example, knowing the...

Read More
image for The Five Questions About Your Security Program

July 5, 2017
The Five Questions to Ask About Your Security Program

Written by Michael Frederick, VP of Operations, HITRUST As board members or senior executives, you are responsible for making governing decisions for all aspects...

Read More

May 17, 2019
HITRUST’s Contribution to Healthcare’s New ‘Network of Networks’

HITRUST’s Role in the New Trusted Exchange Framework and Connected Agreement (TEFCA) By Anne Kimbol, Chief Privacy Officer, HITRUST The federal government took a...

Read More

August 8, 2016
Capitalizing on Analytics Means Protecting, Securing, and Sharing Your Data

By Adam Lorant, VP, Product and Solutions, PHEMI Modern data science and analytics hold the potential to transform healthcare—from helping hospitals operate more efficiently,...

Read More

August 8, 2016
The Art and Science of Cost-Effective HITRUST Certification

By Brian Selfridge, Partner, Meditology Services  Aligning and certifying with the HITRUST CSF is one of the most efficient means of demonstrating compliance and...

Read More

June 7, 2016
Comprehensive Security Assessment or Baseline Security Assessment?

By Ken Vander Wal, Chief Compliance Officer, HITRUST. One of the frequent questions we get from organizations is, “Do we need a comprehensive security assessment...

Read More

Chat Now

This is where you can start a live chat with a member of our team