<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Blog</title>
    <link>https://hitrustalliance.net/blog</link>
    <description>Stay up-to-date with the HITRUST blog, offering valuable insights on cybersecurity trends, data protection, and risk and compliance strategies.</description>
    <language>en</language>
    <pubDate>Wed, 13 May 2026 03:32:16 GMT</pubDate>
    <dc:date>2026-05-13T03:32:16Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Maintaining Assurance Relevance in an AI-Driven Threat Environment</title>
      <link>https://hitrustalliance.net/blog/maintaining-assurance-relevance-in-an-ai-driven-threat-environment</link>
      <description>&lt;p&gt;&lt;em&gt;Recent developments surrounding frontier models, like Anthropic’s Glasswing/Mythos, are intensifying discussion around how AI-driven vulnerability discovery may reshape cybersecurity assurance and third-party trust.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;em&gt;Recent developments surrounding frontier models, like Anthropic’s Glasswing/Mythos, are intensifying discussion around how AI-driven vulnerability discovery may reshape cybersecurity assurance and third-party trust.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=23257256&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fhitrustalliance.net%2Fblog%2Fmaintaining-assurance-relevance-in-an-ai-driven-threat-environment&amp;amp;bu=https%253A%252F%252Fhitrustalliance.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AI</category>
      <category>Third-Party Risk Management</category>
      <category>Assurance</category>
      <pubDate>Wed, 13 May 2026 03:27:21 GMT</pubDate>
      <guid>https://hitrustalliance.net/blog/maintaining-assurance-relevance-in-an-ai-driven-threat-environment</guid>
      <dc:date>2026-05-13T03:27:21Z</dc:date>
      <dc:creator>HITRUST</dc:creator>
    </item>
    <item>
      <title>AI Security Threats aren’t Waiting for Security Frameworks to Catch up. Are You Already Behind?</title>
      <link>https://hitrustalliance.net/blog/ai-security-threats-arent-waiting-for-security-frameworks-to-catch-up.-are-you-already-behind</link>
      <description>&lt;p&gt;&lt;span style="line-height: 20.85px;"&gt;AI is changing the threat landscape faster than many security programs can respond. Traditional frameworks built around static control sets may still check the right boxes on paper, but that alone is no longer enough. Attackers are already using AI to scale phishing, manipulate users, exploit AI-enabled systems, and find new paths into organizations.&lt;/span&gt;&lt;span style="line-height: 20.85px;"&gt; &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span style="line-height: 20.85px;"&gt;AI is changing the threat landscape faster than many security programs can respond. Traditional frameworks built around static control sets may still check the right boxes on paper, but that alone is no longer enough. Attackers are already using AI to scale phishing, manipulate users, exploit AI-enabled systems, and find new paths into organizations.&lt;/span&gt;&lt;span style="line-height: 20.85px;"&gt; &lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=23257256&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fhitrustalliance.net%2Fblog%2Fai-security-threats-arent-waiting-for-security-frameworks-to-catch-up.-are-you-already-behind&amp;amp;bu=https%253A%252F%252Fhitrustalliance.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Threat Management</category>
      <category>HITRUST Framework (CSF)</category>
      <category>Threat Adaptive</category>
      <pubDate>Thu, 30 Apr 2026 13:05:00 GMT</pubDate>
      <guid>https://hitrustalliance.net/blog/ai-security-threats-arent-waiting-for-security-frameworks-to-catch-up.-are-you-already-behind</guid>
      <dc:date>2026-04-30T13:05:00Z</dc:date>
      <dc:creator>HITRUST</dc:creator>
    </item>
    <item>
      <title>Third-Party Risk Insights from the 2026 HITRUST Trust Report</title>
      <link>https://hitrustalliance.net/blog/third-party-risk-insights-from-the-2026-hitrust-trust-report</link>
      <description>&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;Third-party relationships are now central to how organizations operate. They enable scale, innovation, and efficiency across increasingly complex digital ecosystems. But they also represent one of the greatest sources of cyber risk.&lt;/span&gt;&lt;span style="line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;Third-party relationships are now central to how organizations operate. They enable scale, innovation, and efficiency across increasingly complex digital ecosystems. But they also represent one of the greatest sources of cyber risk.&lt;/span&gt;&lt;span style="line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=23257256&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fhitrustalliance.net%2Fblog%2Fthird-party-risk-insights-from-the-2026-hitrust-trust-report&amp;amp;bu=https%253A%252F%252Fhitrustalliance.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Third-Party Risk Management</category>
      <category>Trust</category>
      <pubDate>Wed, 15 Apr 2026 19:54:45 GMT</pubDate>
      <guid>https://hitrustalliance.net/blog/third-party-risk-insights-from-the-2026-hitrust-trust-report</guid>
      <dc:date>2026-04-15T19:54:45Z</dc:date>
      <dc:creator>HITRUST</dc:creator>
    </item>
    <item>
      <title>The 2026 HITRUST Trust Report: Tackling the Trust Crisis</title>
      <link>https://hitrustalliance.net/blog/the-2026-hitrust-trust-report-tackling-the-trust-crisis</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://hitrustalliance.net/blog/the-2026-hitrust-trust-report-tackling-the-trust-crisis" title="" class="hs-featured-image-link"&gt; &lt;img src="https://hitrustalliance.net/hubfs/Trust%20Report%202026/2026%20HITRUST%20Trust%20Report%20-%20Cover.jpg" alt="The 2026 HITRUST Trust Report: Tackling the Trust Crisis" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Cyber threats continue to evolve, and organizations are under increasing pressure to demonstrate that cyber risk is being effectively managed. At the same time, digital ecosystems are becoming more complex, with organizations relying on an expanding network of third parties, cloud providers, and emerging technologies like artificial intelligence.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://hitrustalliance.net/trust-report"&gt;The 2026 HITRUST Trust Report&lt;/a&gt; examines this changing landscape and highlights a growing challenge for security and risk leaders. There is a widening gap between the level of assurance organizations need and what traditional approaches are able to provide.&amp;nbsp;&lt;br&gt;&lt;br&gt;Drawing on four years of performance data across HITRUST-certified environments, The Report provides a data-driven view into how cybersecurity assurance is evolving and what organizations can do to build greater trust in their security posture.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://hitrustalliance.net/blog/the-2026-hitrust-trust-report-tackling-the-trust-crisis" title="" class="hs-featured-image-link"&gt; &lt;img src="https://hitrustalliance.net/hubfs/Trust%20Report%202026/2026%20HITRUST%20Trust%20Report%20-%20Cover.jpg" alt="The 2026 HITRUST Trust Report: Tackling the Trust Crisis" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Cyber threats continue to evolve, and organizations are under increasing pressure to demonstrate that cyber risk is being effectively managed. At the same time, digital ecosystems are becoming more complex, with organizations relying on an expanding network of third parties, cloud providers, and emerging technologies like artificial intelligence.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://hitrustalliance.net/trust-report"&gt;The 2026 HITRUST Trust Report&lt;/a&gt; examines this changing landscape and highlights a growing challenge for security and risk leaders. There is a widening gap between the level of assurance organizations need and what traditional approaches are able to provide.&amp;nbsp;&lt;br&gt;&lt;br&gt;Drawing on four years of performance data across HITRUST-certified environments, The Report provides a data-driven view into how cybersecurity assurance is evolving and what organizations can do to build greater trust in their security posture.&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=23257256&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fhitrustalliance.net%2Fblog%2Fthe-2026-hitrust-trust-report-tackling-the-trust-crisis&amp;amp;bu=https%253A%252F%252Fhitrustalliance.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Leadership</category>
      <category>Cybersecurity</category>
      <category>Trust</category>
      <pubDate>Tue, 07 Apr 2026 12:45:00 GMT</pubDate>
      <guid>https://hitrustalliance.net/blog/the-2026-hitrust-trust-report-tackling-the-trust-crisis</guid>
      <dc:date>2026-04-07T12:45:00Z</dc:date>
      <dc:creator>HITRUST</dc:creator>
    </item>
    <item>
      <title>Building Resilience with Zero Trust in Vendor Risk Management |HITRUST</title>
      <link>https://hitrustalliance.net/blog/a-guide-to-zero-trust-and-vendor-isolation</link>
      <description>&lt;p&gt;Zero trust vendors demand architectures built on continuous verification and isolation. Traditional perimeter defenses cannot protect today’s interconnected ecosystems. This guide outlines how zero trust architecture and vendor isolation strategies reduce supply-chain risk, limit lateral movement, and strengthen operational resilience. It also explains how HITRUST assessments provide a structured, certifiable pathway for implementing and validating these controls in real-world environments.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Zero trust vendors demand architectures built on continuous verification and isolation. Traditional perimeter defenses cannot protect today’s interconnected ecosystems. This guide outlines how zero trust architecture and vendor isolation strategies reduce supply-chain risk, limit lateral movement, and strengthen operational resilience. It also explains how HITRUST assessments provide a structured, certifiable pathway for implementing and validating these controls in real-world environments.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=23257256&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fhitrustalliance.net%2Fblog%2Fa-guide-to-zero-trust-and-vendor-isolation&amp;amp;bu=https%253A%252F%252Fhitrustalliance.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Risk Management</category>
      <category>Third-Party Risk Management</category>
      <pubDate>Mon, 23 Mar 2026 15:00:01 GMT</pubDate>
      <guid>https://hitrustalliance.net/blog/a-guide-to-zero-trust-and-vendor-isolation</guid>
      <dc:date>2026-03-23T15:00:01Z</dc:date>
      <dc:creator>HITRUST</dc:creator>
    </item>
    <item>
      <title>Improving Audit Processes in Vendor Risk Management | HITRUST</title>
      <link>https://hitrustalliance.net/blog/streamlining-audit-process-in-vendor-risk-management</link>
      <description>&lt;p&gt;Vendor risk management audits are becoming unsustainable due to scale. HITRUST enables assessing organizations to replace questionnaires and inconsistent reports with validated, standardized assurance — improving efficiency, reducing costs, and increasing defensibility.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Vendor risk management audits are becoming unsustainable due to scale. HITRUST enables assessing organizations to replace questionnaires and inconsistent reports with validated, standardized assurance — improving efficiency, reducing costs, and increasing defensibility.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=23257256&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fhitrustalliance.net%2Fblog%2Fstreamlining-audit-process-in-vendor-risk-management&amp;amp;bu=https%253A%252F%252Fhitrustalliance.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Assessments</category>
      <category>Third-Party Risk Management</category>
      <category>HITRUST Assurance Program</category>
      <pubDate>Tue, 10 Mar 2026 15:00:00 GMT</pubDate>
      <guid>https://hitrustalliance.net/blog/streamlining-audit-process-in-vendor-risk-management</guid>
      <dc:date>2026-03-10T15:00:00Z</dc:date>
      <dc:creator>HITRUST</dc:creator>
    </item>
    <item>
      <title>AI Broke Vendor Risk Management — Now What?</title>
      <link>https://hitrustalliance.net/blog/ai-broke-vendor-risk-management-now-what</link>
      <description>&lt;p&gt;AI has transformed vendor risk into a supply chain assurance challenge. Healthcare and rural providers are no longer evaluating a single vendor, but layered ecosystems of cloud providers, models, subcontractors, and data sources. Trust now requires independently validated, reusable assurance, not self-attestation.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;AI has transformed vendor risk into a supply chain assurance challenge. Healthcare and rural providers are no longer evaluating a single vendor, but layered ecosystems of cloud providers, models, subcontractors, and data sources. Trust now requires independently validated, reusable assurance, not self-attestation.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=23257256&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fhitrustalliance.net%2Fblog%2Fai-broke-vendor-risk-management-now-what&amp;amp;bu=https%253A%252F%252Fhitrustalliance.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AI</category>
      <category>Third-Party Risk Management</category>
      <category>Healthcare</category>
      <pubDate>Tue, 03 Mar 2026 16:00:02 GMT</pubDate>
      <guid>https://hitrustalliance.net/blog/ai-broke-vendor-risk-management-now-what</guid>
      <dc:date>2026-03-03T16:00:02Z</dc:date>
      <dc:creator>HITRUST</dc:creator>
    </item>
    <item>
      <title>99.41% Resilience Isn’t a Promise — It’s Proof</title>
      <link>https://hitrustalliance.net/blog/99.41-resilience-isnt-a-promise-its-proof</link>
      <description>&lt;p&gt;&lt;em&gt;Gregory Webb, CEO at&amp;nbsp;HITRUST&lt;/em&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;em&gt;Gregory Webb, CEO at&amp;nbsp;HITRUST&lt;/em&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=23257256&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fhitrustalliance.net%2Fblog%2F99.41-resilience-isnt-a-promise-its-proof&amp;amp;bu=https%253A%252F%252Fhitrustalliance.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Data Security</category>
      <category>Threat Management</category>
      <category>Threat Adaptive</category>
      <pubDate>Thu, 19 Feb 2026 13:30:00 GMT</pubDate>
      <guid>https://hitrustalliance.net/blog/99.41-resilience-isnt-a-promise-its-proof</guid>
      <dc:date>2026-02-19T13:30:00Z</dc:date>
      <dc:creator>HITRUST</dc:creator>
    </item>
    <item>
      <title>AI Trilemma Hits TPRM: Innovation Without Losing Assurance</title>
      <link>https://hitrustalliance.net/blog/ai-trilemma-hits-tprm-innovation-without-losing-assurance</link>
      <description>&lt;h2 style="font-size: 30px; font-weight: bold;"&gt;What is the AI trilemma, and why does it matter for healthcare vendors?&lt;/h2&gt; 
&lt;p&gt;In a recent &lt;a href="https://www.foreignaffairs.com/united-states/ai-trilemma"&gt;Foreign Affairs&lt;/a&gt;&amp;nbsp;article, “The AI Trilemma,” the author argues that governments are struggling to balance three competing priorities at once: accelerate AI innovation, manage its risks, and build effective assessment programs. While geopolitical in framing, the same dynamic is unfolding inside healthcare vendor ecosystems. Optimizing all three requires moving beyond traditional questionnaires toward independently validated, decision-grade assurance that keeps innovation aligned with regulatory and security expectations.&lt;/p&gt;</description>
      <content:encoded>&lt;h2 style="font-size: 30px; font-weight: bold;"&gt;What is the AI trilemma, and why does it matter for healthcare vendors?&lt;/h2&gt; 
&lt;p&gt;In a recent &lt;a href="https://www.foreignaffairs.com/united-states/ai-trilemma"&gt;Foreign Affairs&lt;/a&gt;&amp;nbsp;article, “The AI Trilemma,” the author argues that governments are struggling to balance three competing priorities at once: accelerate AI innovation, manage its risks, and build effective assessment programs. While geopolitical in framing, the same dynamic is unfolding inside healthcare vendor ecosystems. Optimizing all three requires moving beyond traditional questionnaires toward independently validated, decision-grade assurance that keeps innovation aligned with regulatory and security expectations.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=23257256&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fhitrustalliance.net%2Fblog%2Fai-trilemma-hits-tprm-innovation-without-losing-assurance&amp;amp;bu=https%253A%252F%252Fhitrustalliance.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Assessments</category>
      <category>AI</category>
      <category>Third-Party Risk Management</category>
      <category>Healthcare</category>
      <pubDate>Tue, 17 Feb 2026 18:07:19 GMT</pubDate>
      <guid>https://hitrustalliance.net/blog/ai-trilemma-hits-tprm-innovation-without-losing-assurance</guid>
      <dc:date>2026-02-17T18:07:19Z</dc:date>
      <dc:creator>HITRUST</dc:creator>
    </item>
    <item>
      <title>How to Prepare and Respond to a Ransomware Attack | HITRUST</title>
      <link>https://hitrustalliance.net/blog/how-to-prepare-for-a-ransomware-attack-in-healthcare</link>
      <description>&lt;p&gt;Preparing for a ransomware attack is now a mission-critical priority for healthcare organizations. Ransomware incidents can disrupt clinical operations, delay patient care, expose sensitive health data, and create significant regulatory and financial consequences. As healthcare ecosystems become more digitally connected, building ransomware resilience requires more than reactive controls. It demands structured preparation, tested response plans, and validated assurance.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Preparing for a ransomware attack is now a mission-critical priority for healthcare organizations. Ransomware incidents can disrupt clinical operations, delay patient care, expose sensitive health data, and create significant regulatory and financial consequences. As healthcare ecosystems become more digitally connected, building ransomware resilience requires more than reactive controls. It demands structured preparation, tested response plans, and validated assurance.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=23257256&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fhitrustalliance.net%2Fblog%2Fhow-to-prepare-for-a-ransomware-attack-in-healthcare&amp;amp;bu=https%253A%252F%252Fhitrustalliance.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity</category>
      <category>Healthcare</category>
      <category>Ransomware</category>
      <pubDate>Tue, 03 Feb 2026 17:10:25 GMT</pubDate>
      <guid>https://hitrustalliance.net/blog/how-to-prepare-for-a-ransomware-attack-in-healthcare</guid>
      <dc:date>2026-02-03T17:10:25Z</dc:date>
      <dc:creator>HITRUST</dc:creator>
    </item>
  </channel>
</rss>
