Policy & Regulation: Page 10


  • Server room (Sefa Ozel/Getty)
    Image attribution tooltip
    Sefa Ozel/Getty via Getty Images
    Image attribution tooltip

    CISA’s top 10 misconfigurations reveal ‘systemic weaknesses’

    Common mistakes including poor credential management, weak MFA and lackluster patching continue to harm large enterprises.

    By Oct. 16, 2023
  • An engineer works with robotic arms in a factory using AI.
    Image attribution tooltip
    greenbutterfly via Getty Images
    Image attribution tooltip

    Federal agencies press OT/ICS providers on open-source security

    The U.S. is scrutinizing the security of critical infrastructure providers, which are becoming more dependent on connected infrastructure.

    By Oct. 12, 2023
  • Law flat icon on wooden block cube with calculator and pencil on dollar bank note money,
    Image attribution tooltip
    grapestock via Getty Images
    Image attribution tooltip

    Progress Software’s financial hit from MOVEit cuts deeper

    With insurance coverage dwindling, and class-action lawsuits and financial restitution claims piling up, more trouble could be on the way for the software company.

    By Oct. 11, 2023
  • Jen Easterly speaks during a fireside chat at the Billington Cybersecurity Summit.
    Image attribution tooltip
    Courtesy of Billington
    Image attribution tooltip

    CISA pivots focus to China-linked threats against critical infrastructure

    The agency now considers China the top nation-state threat, after a heavy emphasis on risks related to the Russia-Ukraine war.

    By Oct. 5, 2023
  • An angular view of the U.S. Capitol building against a clear blue sky.
    Image attribution tooltip
    Permission granted by Dan Zukowski
    Image attribution tooltip

    CISA furloughs will cut deep if government shuts down

    The agency will have to operate with a skeleton staff, which will reduce assessments and other programs for underserved critical infrastructure sectors and private industry partners.

    By Sept. 29, 2023
  • Brightly colored digital lock with central computer processor and futuristic circuit board.
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Cisco routers abused by China-linked hackers against US, Japan companies

    A longstanding group, identified as BlackTech, uses custom malware to evade detection and hack into international subsidiaries of U.S. and Japanese firms.

    By Sept. 28, 2023
  • CISA Director Jen Easterly
    Image attribution tooltip

    Center for Strategic and International Studies

    Image attribution tooltip

    CISA rolls dice on public service campaign to raise cyber awareness

    The agency is hoping to get families and small businesses to adopt MFA, use stronger passwords and recognize phishing attacks.

    By Sept. 27, 2023
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    CISA urges use of memory safe code in software development

    Unsafe programming languages, like C and C++, account for more than 70% of security vulnerabilities. 

    By Sept. 22, 2023
  • The CSC 2.0 report examines the progress made toward implementing the recommendations of the CSC, a congressionally mandated body that was designed to review the ability of the U.S. to deter maliciou
    Image attribution tooltip
    Permission granted by FDD
    Image attribution tooltip

    US is making headway on securing cyber infrastructure, commission says

    While Cyberspace Solarium Commission leaders praised U.S. cybersecurity improvements, they said more work is needed to secure critical infrastructure.

    By Sept. 20, 2023
  • FBI Director Chris Wray addresses the 2023 mWISE Conference from Mandiant.
    Image attribution tooltip
    Courtesy of Mandiant
    Image attribution tooltip

    FBI director urges private sector to work with the agency on cyber threats

    Christopher Wray told attendees at Mandiant’s mWISE 2023 private sector assistance contributed to the success of several recent operations.

    By Sept. 19, 2023
  • Cyber security  firewall interface protection concept. Businesswoman protecting herself from cyber attacks. Personal data security and banking
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    SEC cyber disclosure rules: What’s the role of the CIO?

    CIOs are on the front lines of managing the IT estate, making them a critical part of rapid incident response. 

    By Roberto Torres • Sept. 19, 2023
  • The United States Capitol Building seen at a distance.
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    6 stories on how SEC’s cyber rules are changing security response

    As enforcement of the rules takes effect later this year, themes around how and when businesses will disclose security incidents will emerge. 

    By Naomi Eide • Sept. 15, 2023
  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    White House, federal cyber leaders pledge renewed support for open source security

    CISA released a roadmap for open source software security as industry officials convened to map out additional steps to protect federal agencies and the larger ecosystem.

    By Sept. 13, 2023
  • An exterior image of a the Bellagio hotel in Las Vegas
    Image attribution tooltip
    Robert Mora via Getty Images
    Image attribution tooltip

    MGM Resorts discloses cyber incident in filing with SEC

    Moody’s Investors Service called the cyber incident credit negative, and MGM is still taking steps to protect data and fully secure business operations. 

    By Sept. 13, 2023
  • Anne Neuberger deputy national security advisor for cyber and emerging technologies, speaks at the Billington Cybersecurity Summit with Brad Medairy, EVP, Booz Allen.
    Image attribution tooltip
    Courtesy of Billington CyberSecurity Summit
    Image attribution tooltip

    White House mulls rating system to boost cybersecurity for critical infrastructure

    Anne Neuberger, deputy national security advisor for cyber, told the Billington Cybersecurity Summit that a new ransomware summit is set and updated a consumer labeling push for IoT.  

    By Sept. 11, 2023
  • Jen Easterly speaks during a fireside chat at the Billington Cybersecurity Summit.
    Image attribution tooltip
    Courtesy of Billington
    Image attribution tooltip

    CISA director: Critical infrastructure cyber incident reporting rules almost ready

    The Cybersecurity and Infrastructure Security Agency is in the final stages of work on the reporting requirements included in a March 2022 law.

    By Sept. 8, 2023
  • Acting National Cyber Director Kemba Walden speaks during the Billington Cybersecurity Summit on Sept. 5, 2023 in Washington, D.C.
    Image attribution tooltip
    Permission granted by ZeroFox
    Image attribution tooltip

    Cybersecurity investments boost profitability, resilience: White House

    Expenditures on resilience will help companies reduce downtime, Acting National Cyber Director Kemba Walden said at the Billington Cybersecurity Summit.

    By Sept. 6, 2023
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA creates voluntary ed tech pledge to boost K-12 cybersecurity

    Companies signing the agreement are urged to commit to encouraging the use of multifactor authentication and public vulnerability disclosure.

    By Anna Merod • Sept. 6, 2023
  • Close up of Gary Gensler speaking during a senate hearing
    Image attribution tooltip
    Kevin Dietsch/Getty Images via Getty Images
    Image attribution tooltip

    SEC cyber disclosure rules put CISO liability under the spotlight

    Security executives find themselves in the eye of the needle as governance and incident response come into focus.

    By Sept. 5, 2023
  • The New York Stock Exchange building.
    Image attribution tooltip
    Spencer Platt via Getty Images
    Image attribution tooltip

    SEC cyber disclosure rules are taking effect: Here’s what to expect

    With enforcement on the horizon, much of the SEC's rules for material disclosures are subject to interpretation.

    By Naomi Eide • Aug. 31, 2023
  • An image of Federal Bureau of Investigation Director Christopher Wray at a press conference.
    Image attribution tooltip
    Kevin Dietsch/Getty Images via Getty Images
    Image attribution tooltip

    US leads takedown of Qakbot malware, which automated initial infections

    The botnet and malware had infected more than 700,000 computers worldwide and was linked to the abuse of OneNote files.

    By Aug. 30, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Software industry urged to assume risk on open source security

    The Open Source Security Foundation called on commercial and non-commercial organizations that use open source software components to adopt better security practices.

    By Aug. 25, 2023
  • A textbox with five stars blocking out a word and a lock to simulate password protection.
    Image attribution tooltip
    kaedeezign via Getty Images
    Image attribution tooltip
    Opinion

    Government investigation puts spotlight on password insecurity

    A team working for the Department of Interior’s inspector general successfully cracked 1 in 5 active user passwords, a ratio that highlights traps in cybersecurity standards, Mike Kosask from LastPass writes.

    By Michael Kosak • Aug. 24, 2023
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Cyber authorities have a plan to defend remote monitoring tools

    Threat actors can turn one point of attack into many by targeting remote management services that lack security controls.

    By Aug. 18, 2023
  • A sunlit New York Stock Exchanges is seen with 6 columns and 3 American flags with people walking by in shadow.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    SEC cyber rules ignite tension between reputation and security risk

    The rules, which take effect Sept. 5, encountered mixed reactions. Some champion board-level cyber accountability. Others say the rules are too big of a lift.

    By Aug. 15, 2023