News & Analysis as of

Homeland Security Cybersecurity & Infrastructure Security Agency (CISA)

DLA Piper

FCC prohibits sale and authorization of foreign-made routers in further Covered List expansion: Key implications

DLA Piper on

The Federal Communications Commission (FCC) recently issued a Public Notice adding foreign-made consumer-grade routers to its Covered List, thereby prohibiting the authorization and importation of new device models....more

Eversheds Sutherland (US) LLP

US: Delays to cyber incident reporting rules - What businesses can watch for and do now

The Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) will introduce mandatory US federal reporting of serious cyber incidents and ransomware payments affecting critical infrastructure. “Covered...more

Fisher Phillips

New Federal Cybersecurity Reporting Rules are on Their Way: FAQs for Businesses About CIRCIA Regulations

Fisher Phillips on

A sweeping new federal cybersecurity mandate is on its way, and now is the time for businesses to build the infrastructure you’ll need to comply. The Cybersecurity and Infrastructure Security Agency (CISA) is finalizing draft...more

Alston & Bird

CISA Warns Organizations to Harden Endpoint Management Systems Following Cyberattack on Stryker Corporation

Alston & Bird on

On March 18, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) issued an alert (the Alert) urging U.S. organizations to harden their endpoint management systems following the March 11, 2026 cyberattack against...more

Ballard Spahr LLP

Trump Administration Signals Potential Revisions to Federal Cyber Incident Reporting Requirements

Ballard Spahr LLP on

Following the release of the Trump Administration’s new National Cyber Strategy, National Cyber Director Sean Cairncross noted in a virtual interview that the administration is considering changes to the existing cyber...more

Latham & Watkins LLP

President Trump’s Cyber Strategy and Executive Order Combating Cybercrime: Key Takeaways

Latham & Watkins LLP on

The executive actions emphasize public-private partnerships, enhanced information sharing, and leveraging commercial cybersecurity capabilities....more

Mayer Brown

CISA Announces Town Halls Seeking Input on CIRCIA Implementation

Mayer Brown on

On February 13, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) within the US Department of Homeland Security published a notice in the Federal Register announcing that it would hold a series of town halls...more

Spilman Thomas & Battle, PLLC

The Health Record - Healthcare Law Insights, V3,Issue 2, 2026

Welcome to our second issue of 2026 of The Health Record -- our healthcare law insights e-newsletter. In this edition, we look at recent guidance from HHS urging healthcare providers to step up cybersecurity efforts,...more

Robinson+Cole Data Privacy + Security Insider

SolarWinds Web Help Desk Vulnerability Targeted by Threat Actors

Security researchers at Huntress Labs have identified a vulnerability in SolarWinds’s Web Help Desk that threat actors are exploiting to allow them to execute code remotely....more

Wiley Rein LLP

CISA Reopens Comment Opportunity on Cyber Incident Reporting Requirements

Wiley Rein LLP on

The U.S. Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) is working to finalize a rule that would require large segments of industry to rapidly report to the government when...more

Morgan Lewis

Understanding the Cybersecurity Risks Flooding the Water and Wastewater Systems Sector

Morgan Lewis on

US critical infrastructure has historically been a prime target for threat actors due to the significant and far-reaching consequences of cyberattacks. Today, ongoing geopolitical tensions and escalating global conflict have...more

Robinson+Cole Data Privacy + Security Insider

Here Are the Five Top Security Threats from 2025

Threat actors had another banner year in 2025. As we head into 2026, looking back on the five top security threats of 2025 may inform our strategy and budgeting for 2026 to prepare for the continued onslaught of attacks....more

Ropes & Gray LLP

On the Sixth Day of Data… CISA, CIRCIA, and the Future of Critical Infrastructure Security

Ropes & Gray LLP on

This holiday season—following a year of headline breaches, surging supply-chain attacks, and major regulatory changes—cyber resilience tops every corporate wish list. The Cybersecurity and Infrastructure Security Agency...more

Bradley Arant Boult Cummings LLP

The DOJ Data Security Program: Are You in Compliance?

With the U.S. Department of Justice’s Data Security Program (DSP) now in full effect, companies that handle sensitive personal data, operate across borders, or rely on global vendor ecosystems face an increasingly complex...more

Lowenstein Sandler LLP

F5 Security Incident: BIG‑IP Source Code Theft Spurs Urgent Actions

Lowenstein Sandler LLP on

On October 15, application security vendor F5, Inc. disclosed that a highly sophisticated nation-state threat actor maintained long-term, persistent access to certain F5 systems. The attackers exfiltrated portions of BIG-IP1...more

Shumaker, Loop & Kendrick, LLP

Client Alert: Government Shutdown Creates a "Perfect Storm" for U.S. Cybersecurity

As Washington barrels through another government funding crisis, the most significant impact on the technology and security landscape isn’t happening in a committee room—it’s the effective shuttering of our nation’s frontline...more

Goodwin

CISA 2015 Lapses With Reauthorization Uncertain - Why It Matters, What’s at Stake, and What’s Next

Goodwin on

On Tuesday, September 30, 2025, the Cybersecurity Information Sharing Act of 2015 (CISA 2015) expired after its 10-year effective period lapsed without reauthorization from Congress, in the wake of a government shutdown that...more

Alston & Bird

CISA and FBI Joint Update on Scattered Spider: Evolving Threats and Mitigation Guidance

Alston & Bird on

The Cybersecurity & Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and international partners issued an updated advisory on July 29, 2025, highlighting the evolving tactics, techniques, and...more

Parker Poe Adams & Bernstein LLP

Key Compliance Measures Start This Fall for Companies Under New DOJ Data Security Program

Earlier this spring, the U.S. Department of Justice’s National Security Division (NSD) launched the data security program (DSP). The program is designed to address national security risks posed by foreign adversaries' access...more

Robinson+Cole Data Privacy + Security Insider

CISA + Partners Release Advisory on Scattered Spider

On July 29, 2025, the Cybersecurity & Infrastructure Security Agency (CISA), along with the Federal Bureau of Investigation, Canadian Centre for Cyber Security, Royal Canadian Mounted Police, the Australian Cyber Security...more

Robinson+Cole Data Privacy + Security Insider

SharePoint Server Vulnerabilities Exploited Despite Emergency Patch

Microsoft has confirmed that vulnerabilities in its on-premises SharePoint Server installations, a network spoofing vulnerability (CVE-202549706), and a remote code execution vulnerability (CVE-2025-49704) are being actively...more

Venable LLP

A Closer Look at the Data Security Requirements in DOJ's Bulk Data Rule

Venable LLP on

As described in an earlier alert, the Department of Justice (DOJ) recently announced a 90-day pause in enforcement of the "Bulk Data Rule" for entities engaging in good faith compliance. That 90-day grace period ends on July...more

Vinson & Elkins LLP

CISA Sounds the Alarm on Threats to Operational Technology

Vinson & Elkins LLP on

Earlier this month the Cybersecurity and Infrastructure Security Agency (“CISA”), the U.S. federal agency under the Department of Homeland Security (“DHS”) whose mission is to protect the nation’s critical infrastructure from...more

Davis Wright Tremaine LLP

DOJ Issues Guidance on Foreign Data Access Rule, Announces Conditional 90-Day Enforcement Pause for "Good Faith Efforts"

The Department of Justice (DOJ) has issued guidance on its recently effective rule targeting foreign adversaries that "use commercial activities to access, exploit, and weaponize U.S. Government-related data and Americans'...more

Troutman Pepper Locke

OCC Notifies Congress of Major Email System Security Breach

Troutman Pepper Locke on

On April 8, the Office of the Comptroller of the Currency (OCC) officially notified Congress of a significant information security incident involving its email system. This notification, mandated by the Federal Information...more

384 Results
 / 
View per page
Page: of 16

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide