Policy & Regulation: Page 4


  • A picture of the exterior of the US Department of Health and Human Services. In front of the building is a black sign designating the building's name.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    HHS settles cybersecurity investigation with Montefiore Medical Center

    The nonprofit will pay $4.75 million to settle allegations that data security failures allowed an employee to steal and sell the protected health information of thousands of patients.

    By Emily Olsen • Feb. 8, 2024
  • FBI Director Chris Wray speaks at a House Select Committee hearing on Volt Typhoon. CISA Director Jen Easterly and NSA Director Gen. Paul Nakasone look on.
    Image attribution tooltip
    Kevin Dietsch via Getty Images
    Image attribution tooltip

    CISA, FBI confirm critical infrastructure intrusions by China-linked hackers

    Federal agencies urged critical infrastructure providers and tech manufacturers to take immediate action to protect against malicious threat activity from Volt Typhoon.

    By Feb. 7, 2024
  • Coin stack on international banknotes with house model on table.
    Image attribution tooltip
    Zephyr18 via Getty Images
    Image attribution tooltip

    Mortgage industry attack spree punctuates common errors

    Attacks against Mr. Cooper Group, Fidelity National Financial, First American Financial and loanDepot impacted operations and put customers in a bind.

    By Feb. 6, 2024
  • Close up of Gary Gensler speaking during a senate hearing
    Image attribution tooltip
    Kevin Dietsch/Getty Images via Getty Images
    Image attribution tooltip

    Business, technology groups back SolarWinds motion to dismiss SEC charges

    Former U.S. cybersecurity officials and a group of current and former CISOs warned the fraud suit against SolarWinds could chill intel sharing from the private sector.

    By Feb. 5, 2024
  • M&A, merger due diligence
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Blackbaud settles FTC data security probe into 2020 ransomware attack

    The company is required to delete unnecessary data and inform the agency of future breaches.

    By Feb. 2, 2024
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip

    China-linked hackers primed to attack US critical infrastructure, FBI director says

    Christopher Wray and other top cybersecurity officials warned state-linked hackers are prepositioning for catastrophic attacks to distract from a potential military action.

    By Feb. 1, 2024
  • A photo of the White House.
    Image attribution tooltip
    PorqueNoStudios/iStock via Getty Images
    Image attribution tooltip

    White House rejects efforts to undo SEC cyber disclosure rule

    President Joe Biden would veto the joint resolution that aims to strip the agency’s authority to require companies to disclose cyber incidents and governance processes, the administration said Wednesday.

    By Jan. 31, 2024
  • The U.S. Capitol Building at night with lightning in the background.
    Image attribution tooltip
    Naomi Eide/Security Wall
    Image attribution tooltip

    What’s ahead for cybersecurity in 2024

    A steady stream of threats and new regulations have executives tiptoeing around how to best detail security incidents.

    By Jan. 31, 2024
  • Gary Gensler speaks with his hand outstretched, seated before a microphone.
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    In 2024, the cybersecurity industry awaits more regulation — and enforcement

    Private sector companies and critical infrastructure providers will face unprecedented demands for product security, intelligence sharing and transparency on data security.

    By Jan. 31, 2024
  • Interior of Progress Software's office in Rotterdam, Netherlands.
    Image attribution tooltip
    Retrieved from Progress Software on January 18, 2024
    Image attribution tooltip

    MOVEit liabilities mount for Progress Software

    The company revealed multiple government investigations are underway into the MOVEit vulnerability. It’s also party to more than 100 class-action lawsuits.

    By Jan. 30, 2024
  • Creative image depicting a ransomware attack.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Will the movement to ban ransom payments gain steam in 2024?

    Policies and regulations around ransomware payments are widely expected to change in 2024, but how and to what effect remains in flux.

    By Jan. 23, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Security Wall; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA issues emergency directive for federal agencies to mitigate Ivanti vulnerabilities

    Civilian agencies are under threat following a surge in nation-state linked exploitation of Ivanti Connect Secure and Ivanti Policy Secure devices.

    By Jan. 19, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Security Wall; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA’s 1,200 pre-ransomware alerts saved organizations millions in damages

    The federal agency’s early warning system notified organizations across multiple critical infrastructure sectors of potential impending attacks.

    By Jan. 19, 2024
  • Rendering of digital data code in safety security technology concept.
    Image attribution tooltip
    iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    5 cybersecurity trends to watch in 2024

    Preventative measures remain woefully unmet, the scourge of ransomware is as bad as its ever been, and a wave of new incident reporting and compliance regulations are taking hold. Buckle up, 2024 is here.

    By , Jan. 10, 2024
  • CISA Director Jen Easterly speaks at Carnegie Mellon University urging the tech industry to embrace secure-by-design product development.
    Image attribution tooltip
    Permission granted by Carnegie Mellon University
    Image attribution tooltip

    CISA seeks comment on secure by design principles to boost global software security

    The agency issued an RFI seeking industry input on costs, how to incorporate security into higher education and how to reduce recurring security vulnerabilities.

    By Dec. 21, 2023
  • Silhouette of several business people at a conference room table.
    Image attribution tooltip
    FangXiaNuo via Getty Images
    Image attribution tooltip

    Cyber risk strategies in hot seat as SEC rules go live

    A new climate of regulatory scrutiny is pushing companies to reassess how they manage cyber governance and mitigation at the highest levels.

    By Dec. 20, 2023
  • FBI seal displayed on a wall
    Image attribution tooltip
    Chip Somodevilla/Getty Images via Getty Images
    Image attribution tooltip

    US leads AlphV ransomware infrastructure takedown

    Law enforcement released a decryptor for the prolific threat group and ransomware affiliate service behind some of 2023’s most high-profile attacks.

    By Dec. 19, 2023
  • Close up of Gary Gensler speaking during a senate hearing
    Image attribution tooltip
    Kevin Dietsch/Getty Images via Getty Images
    Image attribution tooltip

    What the SEC weighed in finalizing the cyber disclosure rules

    The SEC's head of the corporate finance division said the burden of meeting compliance and fears of tipping off threat groups were carefully considered prior to final recommendations.

    By Dec. 18, 2023
  • Harry Coker Jr. testifies before Senate Homeland Security and Governmental Affairs Committee.
    Image attribution tooltip
    Kevin Dietsch / Staff via Getty Images
    Image attribution tooltip

    Senate confirms Harry Coker Jr. as national cyber director

    The national security veteran assumes the role at a critical time, tasked with implementing the White House’s national cybersecurity strategy.

    By Dec. 13, 2023
  • SolarWinds
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Security Wall; photograph by ismagilov via Getty Images
    Image attribution tooltip

    Check Point Software in SEC settlement talks in connection with SolarWinds probe

    The cybersecurity firm provided documents and other information related to the 2020 supply chain hack of the SolarWinds Orion platform.

    By Dec. 13, 2023
  • The front of the agency headquarters, reading "United States Security and Exchange Commission" and the number 450 as a man walks in a glass door at the bottom left of the frame.
    Image attribution tooltip
    Mark Wilson/Newsmakers via Getty Images
    Image attribution tooltip

    FBI to field SEC cyber incident disclosure delay requests

    Publicly-traded companies can request incident disclosure delays, but the bar is high. A filing would have to pose a significant threat to public safety or national security.

    By Dec. 12, 2023
  • Anne Neuberger deputy national security advisor for cyber and emerging technologies, speaks at the Billington Cyber Security Summit with Brad Medairy, EVP, Booz Allen.
    Image attribution tooltip
    Courtesy of Billington CyberSecurity Summit
    Image attribution tooltip

    White House wants to set minimum cyber standards for hospitals, healthcare

    The sector has faced a wave of ransomware linked to the critical CitrixBleed vulnerability, which has led to major attacks from LockBit and other threat groups.

    By Dec. 11, 2023
  • Brightly colored digital lock with central computer processor and futuristic circuit board.
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    2 years on, Log4j still haunts the security community

    Research from Veracode shows nearly 2 in 5 applications are still running vulnerable versions.

    By Dec. 8, 2023
  • CISA Director Jen Easterly, RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Security Wall
    Image attribution tooltip

    CISA performance goals program trims exploited CVEs

    Organizations enrolled in the agency’s vulnerability scanning program are showing improved security, but the reduction in exploitable internet-facing services is incremental.

    By Dec. 6, 2023
  • A round industrial building behind a pool of water with a walkway over top
    Image attribution tooltip
    (2008). Retrieved from Environmental Protection Agency.
    Image attribution tooltip

    Water utility cyberattacks underscore ongoing threat to OT

    U.S. officials urged water utilities and industrial sites to employ basic configuration safeguards like securing internet-facing devices and changing default passwords following a series of attacks.

    By Dec. 5, 2023