New HITRUST program helps start-ups with information privacy and security

HITRUST is helping start-up companies make information privacy and security a foundational component while still focusing on growing their business with the introduction of the RightStart Program. The newly introduced program helps start-ups accelerate… Continue reading New HITRUST program helps start-ups with information privacy and security

Trend Micro and HITRUST launch new company to provide cyber risk management as a service

Trend Micro and HITRUST announced they are partnering to launch Cysiv, a new company which provides cyber risk management as a service to select U.S. enterprises that need to better defend themselves from cyberattacks. Preventing data breaches and atta… Continue reading Trend Micro and HITRUST launch new company to provide cyber risk management as a service

HITRUST program addresses security risks when leveraging cloud service providers

To address the misunderstandings, risks and complexities when leveraging service providers, HITRUST is introducing a new program to clarify the roles and responsibilities regarding ownership and operation of security controls while automating and strea… Continue reading HITRUST program addresses security risks when leveraging cloud service providers

Healthcare CISOs: Manage infosec risks and safeguard patient safety

Prominent CISOs from leading health systems and providers throughout the country have come together to establish the Provider Third Party Risk Management Council to develop, recommend and promote a series of practices to manage their information securi… Continue reading Healthcare CISOs: Manage infosec risks and safeguard patient safety

How to minimize healthcare supply chain threats

There are many reasons why healthcare institutions have poor cybersecurity: most resources go towards providing patient care and not enough is left for cybersecurity; not all hospitals have a dedicated cybersecurity team; cybersecurity policies and aut… Continue reading How to minimize healthcare supply chain threats

New infosec products of the week​: February 3, 2017

New approach to continuous Docker container security NeuVector’s solution for container security is itself a container. The application automatically learns and whitelists normal behavior to protect environments even as containers scale up and down. Through this built-in continuous application and network intelligence, it provides application layer segmentation that isolates container traffic. Any abnormal connections can then be detected and blocked before causing harm. NeuVector completes its solution with runtime vulnerability scanning across all running containers … More Continue reading New infosec products of the week​: February 3, 2017