Policy & Regulation: Page 2


  • Street view of the Securities and Exchange Commission, SEC, Building in Washington DC.
    Image attribution tooltip
    qingwa via Getty Images
    Image attribution tooltip

    SEC settles charges with 4 firms it says downplayed SolarWinds hack exposure

    The agency alleged Unisys, Avaya, Check Point Software and Mimecast misled investors about the extent of their respective cyber risks.

    By Oct. 22, 2024
  • The seal of the Federal Communications Commission.
    Image attribution tooltip
    Mark Wilson / Getty Images via Getty Images
    Image attribution tooltip

    FCC expands cooperation with states on data security, privacy enforcement

    More states are working with the agency to investigate possible violations of consumer privacy and data security laws.

    By Oct. 22, 2024
  • Capitol Hill lit up at night
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    New legislation aims to tame ‘Wild West’ in healthcare cybersecurity

    The proposed bill, introduced last month by Sens. Ron Wyden and Mark Warner, is a good step forward, but hospitals may need more funds to boost their cybersecurity practices, experts say.

    By Emily Olsen • Oct. 22, 2024
  • Microsoft President and Vice Chair Brad Smith speaks April 12, 2023, at the Semafor World Economy Summit in Washington D.C.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Microsoft confirms partial loss of security log data on multiple platforms

    The company previously expanded free access to security logs on several platforms, including Purview, following the 2023 state-linked hack of Exchange Online.

    By Oct. 18, 2024
  • CISA Director Jen Easterly speaks at Carnegie Mellon University urging the tech industry to embrace secure-by-design product development.
    Image attribution tooltip
    Permission granted by Carnegie Mellon University
    Image attribution tooltip

    FBI, CISA seek input on software security, configuration changes

    Authorities are seeking public comment on steps the software industry can take to make their products more resistant to malicious threat activity.

    By Oct. 17, 2024
  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    US disables Anonymous Sudan infrastructure linked to DDoS attack spree

    Authorities unsealed charges alleging two Sudanese nationals ran the hacktivist group, linked to major attacks against Microsoft and others.

    By Oct. 17, 2024
  • SEC seal outside Washington D.C. building
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Majority of global CISOs want to split roles as regulatory burdens grow

    Trellix research shows rising cybersecurity demands from the SEC and other government bodies are pushing CISOs even closer to the edge.

    By Oct. 15, 2024
  • A facade of the White House in Washington, D.C.
    Image attribution tooltip
    Nick van Bree via Getty Images
    Image attribution tooltip

    Cyber risk tops C-suite concerns heading into US election

    A report by PwC shows American business leaders will continue to focus on data regulation, AI and technology investments regardless of which party prevails in November.

    By Oct. 10, 2024
  • Building Exterior with Marriott sign
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    FTC settles yearslong investigation into Marriott’s ‘security failures’

    The settlement caps a pattern of major data breaches at Marriott and its subsidiary Starwood Hotels and Resorts Worldwide over the last decade.

    By Oct. 10, 2024
  • A large commercial building with a green grass lawn is framed through a wire metal fence mesh. National Institutes of Standards and Technology in Gaithersburg, Md., on April 17, 2022.
    Image attribution tooltip
    The image by Jerrye & Roy Klotz, M.D. is licensed under CC BY-SA 4.0
    Image attribution tooltip
    Deep Dive

    CIOs turn to NIST to tackle generative AI’s many risks

    Discover's CIO is one of many tech leaders working to limit generative AI missteps by turning to risk management frameworks to get deployment right from the outset.

    By Lindsey Wilkinson • Oct. 9, 2024
  • The White House in Washington, D.C.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Counter Ransomware Initiative summit emphasizes arduous effort

    An international collective of cyber officials continued discussions with the White House on how to counter ransomware attacks, reduce payments and increase response capabilities.

    By Oct. 7, 2024
  • New York Gov. Kathy Hochul at a podium.
    Image attribution tooltip
    (2024). "Pausing Congestion Pricing to Address Affordability and the Cost of Living in New York" [Video]. Retrieved from Governor Kathy Hochul/Youtube.
    Image attribution tooltip

    State CISOs up against a growing threat environment with minimal funding, report finds

    A report by Deloitte and NASCIO warns that states do not have the resources necessary to fight state-backed and criminal threat groups.

    By Oct. 2, 2024
  • People enjoy the warm weather outside the White House on April 28, 2024 in Washington, DC.
    Image attribution tooltip
    Kent Nishimura via Getty Images
    Image attribution tooltip

    Ransomware attacks surge despite international enforcement effort

    Progress remains elusive as federal authorities point to ransomware payments inhibiting progress to reduce the volume and impact of attacks.

    By Oct. 1, 2024
  • T-Mobile storefront in San Francisco.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    FCC reaches $31.5M settlement with T-Mobile over rash of data breaches

    The company agreed to a major change in board-level governance and will make a series of upgrades to boost its cyber resilience.

    By Oct. 1, 2024
  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    CISA again raises alarm on hacktivist threat to water utilities

    The alert comes just days after an attack against a water treatment facility in Kansas.

    By Sept. 26, 2024
  • Sen. Angus King discussed a report on the implementation of cybersecurity recommendations during a presentation on Sept. 19, 2024 in Washington D.C.
    Image attribution tooltip
    Permission granted by FDD
    Image attribution tooltip

    Cyber commission seeks detailed plan to secure high-risk infrastructure

    A report said most recommendations from the Cyberspace Solarium Commission are near completion, but also called for greater private-sector collaboration and insurance reforms.

    By Sept. 25, 2024
  • CrowdStrike SVP Adam Meyers testifies to the House Subcommittee on Cybersecurity and Infrastructure Protection.
    Image attribution tooltip
    Anna Moneymaker / Getty Images via Getty Images
    Image attribution tooltip

    CrowdStrike’s mea culpa: 5 takeaways from the Capitol Hill testimony

    CrowdStrike was quick to apologize after a faulty content update triggered a global IT network outage. An executive detailed internal changes designed to prevent it from happening again.

    By Sept. 25, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA catalog falls short on CVEs targeted by Flax Typhoon

    A report by VulnCheck highlights the ongoing backlog in identifying active exploitation of CVEs.

    By Sept. 24, 2024
  • Digital rendering of space
    Image attribution tooltip

    Fiction Tribe

    Image attribution tooltip
    Sponsored by Fortinet

    Why it’s key to foster GenAI buy-in for SecOps

    Generative AI  is now one of the most effective ways to strengthen SecOps. Explore its potential.

    Sept. 23, 2024
  • FBI Director Chris Wray announces a major operation to disrupt a state-linked botnet, during a speech the Aspen Cyber Summit, Sept. 18, 2024.
    Image attribution tooltip
    Permission granted by Aspen Cyber Summit, Laurence Genon
    Image attribution tooltip

    US authorities take down a Mirai-variant botnet tied to DDoS threat

    An FBI-led operation to disrupt a China-linked botnet comes months after a similar operation in January linked to Volt Typhoon.

    By Sept. 19, 2024
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    TU IS via Getty Images
    Image attribution tooltip

    Suffolk County ransomware attack linked to lack of planning, ignored warnings

    A special report blames county officials for ignoring FBI warnings during the 2022 attack and an overall failure of IT and security leadership.

    By Sept. 18, 2024
  • The sun sets on the facade of the U.S. Treasury Department.
    Image attribution tooltip
    mrbfaust via Getty Images
    Image attribution tooltip

    Key cyber insurance stakeholders urge government to help close $900B in uncovered risk

    Marsh McLennan and Zurich Insurance Group issued a white paper urging a public-private partnership to help tackle a growing coverage gap. The White House is working on a plan. 

    By Sept. 6, 2024
  • National Cyber Director Harry Coker speaks in Washington.
    Image attribution tooltip
    Permission granted by Information Technology Industry Council
    Image attribution tooltip

    White House launches cybersecurity hiring sprint to help fill 500,000 job openings

    National Cyber Director Harry Coker Jr. unveiled the program as part of an effort to fill a continued gap in cyber, technology and AI positions.

    By Sept. 5, 2024
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Prolific RansomHub engaged in attack spree, feds warn

    The group has been among the most active threat groups of 2024, and is linked to a tool that can neutralize endpoint security.

    By Sept. 4, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA launches cyber incident reporting portal to streamline breach disclosure

    The secure portal is designed to encourage faster and more robust information sharing about malicious attacks and critical vulnerabilities.

    By Aug. 30, 2024