Cybersecurity compliance program
- 
	
	Once relegated to the legal department and viewed as a box-checking exercise, compliance has undergone a dramatic transformation. In today’s data-driven economy, it... Read blog
- 
	
	The Cybersecurity Maturity Model Certification (CMMC), version 2.0, is on pace to be finalized sooner than expected. That means Department of Defense (DoD)... Read blog
- 
	
	Back in August, HITRUST began supporting the security requirements of the Trusted Exchange Framework and Common Agreement (TEFCA) program. The TEFCA Recognized Coordinating... Read blog
- 
	Debunking the Myths about SOC 207/15/22With the alphabet soup you see every day that is the myriad of industry regulations your organization must contend with; it could be... Read blog
- 
	The Value of HITRUST Certification07/01/22There are plenty of industry-related regulations your company must follow, and one of them is likely the HITRUST Common Security Framework (CSF). However,... Read blog
- 
	
	It is official – 10 percent of U.S. states have data privacy legislation on the books. About a month ago, Connecticut joined California, Virginia,... Read blog
- 
	
	NIST is known for its intense Cybersecurity Framework, but it also has a reputation for providing collaboration between its programs. This includes the... Read blog
- 
	GDPR Applies to Your Startup, Too05/13/22Startups often operate in regulatory grey areas, with many founders preferring to execute now and ask for forgiveness from regulators later. However, growing... Read blog
- 
	HIPAA Enforcement is Back04/27/22In late March, the U.S. Department of Health and Human Services Office for Civil Rights (OCR) reported four new HIPAA enforcement actions after... Read blog
- 
	
	At the end of March, the Payment Card Industry Security Standards Council (PCI SSC) published version 4.0 of its PCI Data Security Standard... Read blog