Policy & Regulation: Page 19


  • Close shot of the U.S. Capitol dome against the bright blue sky.
    Image attribution tooltip
    Brendan Hoffman via Getty Images
    Image attribution tooltip
    Opinion

    How the US government’s cyber priorities will impact businesses

    There is a high probability that enterprise leaders will need to comply with some level of federal cybersecurity requirements or guidance.

    By Tim Mackey • Sept. 9, 2022
  • Two people sitting on a stage during a conference, with a U.S. flag in the background.
    Image attribution tooltip
    Permission granted by Billington CyberSecurity
    Image attribution tooltip

    CISA Director: Tech industry should infuse security at product design stage

    Agency director Jen Easterly outlined a push for faster incident reporting and closer industry collaboration.

    By Sept. 7, 2022
  • a software developer writes code while using an external monitor in an office setting Explore the Trendline
    Image attribution tooltip
    Nattakorn Maneerat via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • Concept with expert setting up automated software on laptop computer.
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Feds push for developers to take lead in securing software supply chain

    The guidelines from CISA and the NSA come amid a growing movement to “shift left” and evaluate software security earlier in the development cycle. 

    By Sept. 2, 2022
  • Federal Trade Commission
    Image attribution tooltip
    Carol Highsmith. (2005). "The Apex Building" [Photo]. Retrieved from Wikimedia Commons.
    Image attribution tooltip

    Twitter whistleblower claims may bolster federal privacy push

    Bipartisan efforts to protect consumer information may gain momentum following allegations that Twitter failed to safeguard private data.

    By Jim Tyson • Aug. 23, 2022
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    DOE to support development of ‘next-generation cyber tools’ to protect grid

    The agency announced $45 million will be available for up to 15 “next-generation” cybersecurity research, development and demonstration projects.

    By Robert Walton • Aug. 19, 2022
  • cybersecurity stock photo
    Image attribution tooltip
    Yudram_TA via Getty Images
    Image attribution tooltip

    Zero trust adoption skyrockets, nearing universal adoption

    A report from Okta shows organizations fully embracing zero-trust principles, as hybrid work requires long-term changes to identity management. 

    By Aug. 16, 2022
  • CISA Director Jen Easterly, RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CISA director lauds first-year efforts of public-private cyber collaborative

    One year into the Joint Cyber Defense Collaborative, Jen Easterly says the partnership has helped limit the scale of threats.

    By Aug. 15, 2022
  • Chris Krebs, former director of the Cybersecurity and Infrastructure Security Agency.
    Image attribution tooltip
    Tasos Katopodis via Getty Images
    Image attribution tooltip

    US falters while ‘cybercriminals have been eating our lunch,’ ex-CISA chief Krebs says

    A dizzying array of agencies and disorganized efforts bolsters Chris Krebs’ call for a cybersecurity governance overhaul.

    By Aug. 12, 2022
  • Chris Krebs, former director of the Cybersecurity and Infrastructure Security Agency, testifies on Capitol Hill, October 19, 2017 in Washington, DC.
    Image attribution tooltip
    Drew Angerer/Getty Images via Getty Images
    Image attribution tooltip

    Don’t count on government, tech vendors to fix security woes, former CISA chief Krebs says

    The state of cybersecurity is bad and it’s going to get worse, Chris Krebs said at Black Hat. But somehow things might eventually get better.

    By Aug. 10, 2022
  • Cryptocurrency
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Blockchain, privacy advocates push back on Tornado Cash sanctions

    Groups are decrying the Treasury Department's virtual currency mixer sanctions, saying they harm the ability of crypto users to conduct secure and private transactions. 

    By Aug. 10, 2022
  • The White House exterior in the morning light with an American flag flying.
    Image attribution tooltip
    Chip Somodevilla / Staff via Getty Images
    Image attribution tooltip

    White House to incorporate performance metrics into national cybersecurity strategy

    The Office of the National Cyber Director is working across multiple federal agencies and private sector partners to set priorities and assess effectiveness.

    By Aug. 5, 2022
  • A wide camera angle of the U.S. Capitol in Washington, DC
    Image attribution tooltip
    Stefan Zaklin via Getty Images
    Image attribution tooltip

    US must take a lead role in cyber diplomacy, State Dept. nominee says

    Nathaniel Fick told lawmakers the U.S. should promote international cyber norms to protect national security from authoritarian threats. 

    By Aug. 4, 2022
  • A man and a woman shake hands in front of a desk that has flags from the U.S. and Ukraine. The people are in front of a blue background with CISA logos.
    Image attribution tooltip
    Retrieved from Jen Easterly/CISA.
    Image attribution tooltip

    CISA expands cyber relationship with Ukraine authorities

    The agreement formalizes closer ties between Ukraine and the key U.S. cybersecurity agency after the war with Russia led to increased threat activity. 

    By July 28, 2022
  • A closeup up a car dashboard with a a driver's hand. A phone is on a mount to the right of the steering wheel.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Uber reaches non-prosecution deal with feds after concealing data breach

    The ride-sharing firm had been under investigation by the Federal Trade Commission, when the 2016 data breach occurred, an event undisclosed until new management entered the picture. 

    By July 26, 2022
  • Coins falling into a piggybank.
    Image attribution tooltip
    marchmeena29 via Getty Images
    Image attribution tooltip

    Breach rule would give credit unions longer reporting window than banks

    The 72-hour timeframe falls in line with the Critical Infrastructure Act that President Joe Biden signed in March, but is twice as long as the reporting window banks have had to comply with since May.

    By Anna Hrushka • July 26, 2022
  • The T-Mobile logo is displayed outside of a T-Mobile store on April 24, 2017 in San Francisco.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    T-Mobile agrees to $500M settlement for 2021 cyberattack

    The wireless carrier suffered a massive data breach in the summer of 2021, the fifth publicly acknowledged incident of its type in three years.

    By July 25, 2022
  • Image attribution tooltip
    Courtesy of Colonial Pipeline Company
    Image attribution tooltip

    TSA revises cybersecurity requirements for oil and gas pipelines

    The agency released performance-based requirements after extensive industry debate following the May 2021 Colonial Pipeline ransomware attack.

    By July 22, 2022
  • The California state flag waves in the wind.
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    California privacy rules target dark patterns through technology design

    California Privacy Rights Act provisions that will go into effect in January will provide more control to consumers over how companies use their data. 

    By Robert Freedman • July 21, 2022
  • A person standing at a podium speaking before a group of people in a room with an ornate floor.
    Image attribution tooltip
    Retrieved from Jen Easterly/CISA.
    Image attribution tooltip

    White House takes on cyber workforce gap through 120-day apprenticeship sprint

    A cyber workforce and education summit at the White House Tuesday was designed to address the long-standing shortage of qualified and diverse candidates for security operations teams. 

    By July 20, 2022
  • Google logo displayed outside the company's New York City office.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Google deal to buy Mandiant clears key antitrust hurdle

    The Department of Justice cleared the deal last week, but the $5.4 billion agreement remains subject to approval by foreign regulators.

    By July 19, 2022
  • Huawei logo depicted on side of building at company's campus in Dongguan, China.
    Image attribution tooltip
    Kevin Frayer via Getty Images
    Image attribution tooltip

    US effort to rip and replace hardware made in China is ballooning in cost

    A yearslong push to remove telecom equipment deemed a national security threat continues to vex regulators.

    By July 18, 2022
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA eyes cross-pond cyber cooperation with London office

    Federal agencies have worked closely with allies to combat malicious cyber activity and illicit use of cryptocurrency.

    By July 18, 2022
  • Secretary of State Antony Blinken speaks alongside President Joe Biden.
    Image attribution tooltip
    Mark Makela/Getty Images via Getty Images
    Image attribution tooltip

    The US is losing the cyberspace race

    Decades-old policies have failed to stem a growing threat, the Council of Foreign Relations said. What if the U.S. embraced a more limited and realistic strategy?

    By July 15, 2022
  • The U.S. Capitol Building at night with lightning in the background.
    Image attribution tooltip
    Naomi Eide/Cybersecurity Dive
    Image attribution tooltip

    Log4j is far from over, cyber review board says

    Exploitation of Log4j occurred at lower levels than experts predicted, yet it remains an "endemic vulnerability," the Cyber Safety Review Board said.

    By Naomi Eide • July 14, 2022
  • A person works next to a 5G logo.
    Image attribution tooltip
    David Ramos/Getty Images via Getty Images
    Image attribution tooltip

    What to watch with 5G network security

    For wireless network carriers, 5G is a model of what’s next. But it also introduces features and services that dramatically expand the threat surface.

    By July 8, 2022