Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:14 PM
Dark Reading
Dark Reading
Products and Releases

LockPath Adds HITRUST Common Security Framework To Keylight Platform

Will help healthcare organizations better ensure personal health information privacy by understanding and mitigating security risks

OVERLAND PARK, KS – December 17, 2012 – LockPath, a provider of innovative governance, risk and compliance (GRC) applications, today announced it will integrate the Health Information Trust Alliance (HITRUST) Common Security Framework (CSF) with its Keylight platform. This addition to Keylight’s extensive Content Library will offer the ability to quickly access and correlate the HITRUST CSF within Keylight, simplifying compliance reporting and helping healthcare organizations better ensure personal health information privacy by understanding and mitigating security risks.

The HITRUST CSF is an information security framework that harmonizes the requirements of existing standards and regulations, including federal (HIPAA, HITECH), third party (PCI, COBIT) and government (NIST, FTC). As a framework, the CSF provides organizations with the needed structure, detail and clarity relating to information security tailored to the healthcare industry.

Integrating and correlating data from multiple sources and systems into a single view is essential to effectively safeguard patient records and manage compliance risk factors. Keylight delivers integrated, actionable dashboards and reports to provide a holistic view of an organization’s security and risk posture. Healthcare organizations of all sizes are using LockPath to address the increasingly complex issues of regulatory compliance and risk management. With LockPath, healthcare organizations can:

· Get one consolidated view of all compliance and risk factors

· Manage regulations and standards including HIPAA, NIST, CMS, FDA

· Minimize data breaches and litigation

· Increase operational efficiency while managing risk

· Automate processes and simplify reporting

· Streamline vendor audits and risk assessments

· Ensure employee training and awareness for emergency procedures

· Prove environmental standards compliance

“While governance, risk and compliance solutions are available for large hospital networks, most are too expensive and unwieldy for smaller entities. Our mission is to give customers an easy-to-use, affordable solution for their risk and compliance headaches,” said Chris Caldwell, co-founder and CEO, LockPath. “The addition of the HITRUST CSF ensures that we continue to do just that – giving our healthcare customers a simple, best-practice approach to better manage risks and demonstrate compliance.”

“Safeguarding personal health information is absolutely critical for healthcare organizations of all sizes,” said Dr. Bryan Cline, vice president, CSF development and implementation, and chief information security officer, HITRUST. "The HITRUST CSF and advanced GRC tools like Keylight are simplifying and streamlining the assessment and compliance process so healthcare organizations across the country can improve information protection.”

For more information on the Keylight platform, please visit LockPath.com or call 913-601-4800.


The Health Information Trust Alliance (HITRUST) was born out of the belief that information security should be a core pillar of, rather than an obstacle to, the broad adoption of health information systems and exchanges. HITRUST, in collaboration with health care, business, technology and information security leaders, has established the Common Security Framework (CSF), a certifiable framework that can be used by any and all organizations that create, access, store or exchange personal health or financial information. In addition to establishing the CSF, HITRUST is driving adoption of and widespread confidence in a framework and sound risk-management practices through education, advocacy and outreach activities. For more information, visit http://www.hitrustalliance.net/.

About LockPath

LockPath speeds and improves organizations’ business and risk decision making. Its purpose-built Keylight platform correlates data, policies, procedures and assets from numerous sources to provide a comprehensive information security management system (ISMS) and IT government, risk and compliance (GRC) reporting across any organization. Forward-thinking product design is recognized by analysts and leading industry publications/awards as the next generation of IT GRC. LockPath is headquartered in Kansas City. Visit LockPath.com to learn more.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version allows unauthenticated remote attackers to start a telnetd service on the device.