Policy & Regulation


  • National Cyber Director Harry Coker Jr. delivers keynote on the national cybersecurity strategy implementation plan on May 22, 2024 at the McCrary Institute at Auburn University in Washington D.C.
    Image attribution tooltip
    Permission granted by McCrary Institute
    Image attribution tooltip

    USDA, White House launch study to boost cyber resilience of rural water utilities

    A yearlong program with the National Rural Water Association will provide technical assistance to water utilities led by Vermont and Oregon officials.

    By Nov. 4, 2024
  • John Pearce of Grant Thornton speaking during a CFO Dive panel
    Image attribution tooltip
    CIO Dive CFO Dive Panel/Cybersecurity Dive
    Image attribution tooltip

    SEC cyber rules could survive regardless of election outcome, experts say

    As the U.S. presidential election looms, cybersecurity remains a bipartisan focus, experts said during a joint CFO Dive and CIO Dive live event.

    By Grace Noto • Nov. 4, 2024
  • A photo illustration of Kamala Harris and Donald Trump shoulder to shoulder facing away from each other. The background is a purple wave with a grid gradient.
    Image attribution tooltip

    Photo illustration: Industry Dive; Joe Readle/Getty Images; Brandon Bell/Getty Images

    Image attribution tooltip

    As presidential election looms, disparate approaches to cyber policy come into focus

    Government officials and security leaders are hoping the nation’s need for cyber resilience will stand on bipartisan cooperation and transcend partisan politics regardless of the election results. 

    By Oct. 31, 2024
  • A man and a woman shake hands in front of a desk that has flags from the U.S. and Ukraine. The people are in front of a blue background with CISA logos.
    Image attribution tooltip
    Retrieved from Jen Easterly/CISA.
    Image attribution tooltip

    CISA rolls out international strategic plan to bolster cyber cooperation

    The agency is looking to strengthen intel sharing with key cyber partners, raise security standards and ensure a more resilient global supply chain. 

    By Oct. 30, 2024
  • People watch the presidential debate during a debate watch party at Penn Social on Sept. 10, 2024, in Washington
    Image attribution tooltip
    Alex Wong / Getty Images News via Getty Images
    Image attribution tooltip

    Cyber task force has a long to-do list for next president

    The change in leadership presents an opportunity to assess what’s working, where adjustments could be made and areas that are in most need of prioritization, the McCrary Institute said.

    By Oct. 29, 2024
  • Street view of the Securities and Exchange Commission, SEC, Building in Washington DC.
    Image attribution tooltip
    qingwa via Getty Images
    Image attribution tooltip

    SEC settles charges with 4 firms it says downplayed SolarWinds hack exposure

    The agency alleged Unisys, Avaya, Check Point Software and Mimecast misled investors about the extent of their respective cyber risks.

    By Oct. 22, 2024
  • The seal of the Federal Communications Commission.
    Image attribution tooltip
    Mark Wilson / Getty Images via Getty Images
    Image attribution tooltip

    FCC expands cooperation with states on data security, privacy enforcement

    More states are working with the agency to investigate possible violations of consumer privacy and data security laws.

    By Oct. 22, 2024
  • Capitol Hill lit up at night
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    New legislation aims to tame ‘Wild West’ in healthcare cybersecurity

    The proposed bill, introduced last month by Sens. Ron Wyden and Mark Warner, is a good step forward, but hospitals may need more funds to boost their cybersecurity practices, experts say.

    By Emily Olsen • Oct. 22, 2024
  • Microsoft President and Vice Chair Brad Smith speaks April 12, 2023, at the Semafor World Economy Summit in Washington D.C.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Microsoft confirms partial loss of security log data on multiple platforms

    The company previously expanded free access to security logs on several platforms, including Purview, following the 2023 state-linked hack of Exchange Online.

    By Oct. 18, 2024
  • CISA Director Jen Easterly speaks at Carnegie Mellon University urging the tech industry to embrace secure-by-design product development.
    Image attribution tooltip
    Permission granted by Carnegie Mellon University
    Image attribution tooltip

    FBI, CISA seek input on software security, configuration changes

    Authorities are seeking public comment on steps the software industry can take to make their products more resistant to malicious threat activity.

    By Oct. 17, 2024
  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    US disables Anonymous Sudan infrastructure linked to DDoS attack spree

    Authorities unsealed charges alleging two Sudanese nationals ran the hacktivist group, linked to major attacks against Microsoft and others.

    By Oct. 17, 2024
  • SEC seal outside Washington D.C. building
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Majority of global CISOs want to split roles as regulatory burdens grow

    Trellix research shows rising cybersecurity demands from the SEC and other government bodies are pushing CISOs even closer to the edge.

    By Oct. 15, 2024
  • A facade of the White House in Washington, D.C.
    Image attribution tooltip
    Nick van Bree via Getty Images
    Image attribution tooltip

    Cyber risk tops C-suite concerns heading into US election

    A report by PwC shows American business leaders will continue to focus on data regulation, AI and technology investments regardless of which party prevails in November.

    By Oct. 10, 2024
  • Building Exterior with Marriott sign
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    FTC settles yearslong investigation into Marriott’s ‘security failures’

    The settlement caps a pattern of major data breaches at Marriott and its subsidiary Starwood Hotels and Resorts Worldwide over the last decade.

    By Oct. 10, 2024
  • A large commercial building with a green grass lawn is framed through a wire metal fence mesh. National Institutes of Standards and Technology in Gaithersburg, Md., on April 17, 2022.
    Image attribution tooltip
    The image by Jerrye & Roy Klotz, M.D. is licensed under CC BY-SA 4.0
    Image attribution tooltip
    Deep Dive

    CIOs turn to NIST to tackle generative AI’s many risks

    Discover's CIO is one of many tech leaders working to limit generative AI missteps by turning to risk management frameworks to get deployment right from the outset.

    By Lindsey Wilkinson • Oct. 9, 2024
  • The White House in Washington, D.C.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Counter Ransomware Initiative summit emphasizes arduous effort

    An international collective of cyber officials continued discussions with the White House on how to counter ransomware attacks, reduce payments and increase response capabilities.

    By Oct. 7, 2024
  • New York Gov. Kathy Hochul at a podium.
    Image attribution tooltip
    (2024). "Pausing Congestion Pricing to Address Affordability and the Cost of Living in New York" [Video]. Retrieved from Governor Kathy Hochul/Youtube.
    Image attribution tooltip

    State CISOs up against a growing threat environment with minimal funding, report finds

    A report by Deloitte and NASCIO warns that states do not have the resources necessary to fight state-backed and criminal threat groups.

    By Oct. 2, 2024
  • People enjoy the warm weather outside the White House on April 28, 2024 in Washington, DC.
    Image attribution tooltip
    Kent Nishimura via Getty Images
    Image attribution tooltip

    Ransomware attacks surge despite international enforcement effort

    Progress remains elusive as federal authorities point to ransomware payments inhibiting progress to reduce the volume and impact of attacks.

    By Oct. 1, 2024
  • T-Mobile storefront in San Francisco.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    FCC reaches $31.5M settlement with T-Mobile over rash of data breaches

    The company agreed to a major change in board-level governance and will make a series of upgrades to boost its cyber resilience.

    By Oct. 1, 2024
  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    CISA again raises alarm on hacktivist threat to water utilities

    The alert comes just days after an attack against a water treatment facility in Kansas.

    By Sept. 26, 2024
  • Sen. Angus King discussed a report on the implementation of cybersecurity recommendations during a presentation on Sept. 19, 2024 in Washington D.C.
    Image attribution tooltip
    Permission granted by FDD
    Image attribution tooltip

    Cyber commission seeks detailed plan to secure high-risk infrastructure

    A report said most recommendations from the Cyberspace Solarium Commission are near completion, but also called for greater private-sector collaboration and insurance reforms.

    By Sept. 25, 2024
  • CrowdStrike SVP Adam Meyers testifies to the House Subcommittee on Cybersecurity and Infrastructure Protection.
    Image attribution tooltip
    Anna Moneymaker / Getty Images via Getty Images
    Image attribution tooltip

    CrowdStrike’s mea culpa: 5 takeaways from the Capitol Hill testimony

    CrowdStrike was quick to apologize after a faulty content update triggered a global IT network outage. An executive detailed internal changes designed to prevent it from happening again.

    By Sept. 25, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA catalog falls short on CVEs targeted by Flax Typhoon

    A report by VulnCheck highlights the ongoing backlog in identifying active exploitation of CVEs.

    By Sept. 24, 2024
  • Digital rendering of space
    Image attribution tooltip

    Fiction Tribe

    Image attribution tooltip
    Sponsored by Fortinet

    Why it’s key to foster GenAI buy-in for SecOps

    Generative AI  is now one of the most effective ways to strengthen SecOps. Explore its potential.

    Sept. 23, 2024
  • FBI Director Chris Wray announces a major operation to disrupt a state-linked botnet, during a speech the Aspen Cyber Summit, Sept. 18, 2024.
    Image attribution tooltip
    Permission granted by Aspen Cyber Summit, Laurence Genon
    Image attribution tooltip

    US authorities take down a Mirai-variant botnet tied to DDoS threat

    An FBI-led operation to disrupt a China-linked botnet comes months after a similar operation in January linked to Volt Typhoon.

    By Sept. 19, 2024