Skip to content
Search

Latest Stories

cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

As Cyber Threats Grow, the Clock Ticks on a Critical Cybersecurity Law

Experts warn of the risk of losing key threat intelligence sharing legislation

As Cyber Threats Grow, the Clock Ticks on a Critical Cybersecurity Law

A binary code can be seen on the display of a laptop.

(

Photo by Silas Stein/picture alliance via Getty Images

)
DEEP DIVE – The onslaught of cyberattacks against the U.S. and U.S. businesses has not let up and the clock is ticking on reauthorizing a new bill that - if not renewed - will make it even harder to defend against the threat.

The Cybersecurity Information Sharing Act (CISA), a cornerstone of U.S. cybersecurity policy passed in 2015, now faces expiration on September 30, unless Congress renews it. The legislation facilitates the sharing of cyber threat intelligence (CTI) between the federal government and the private sector. It specifically provides legal cover to companies that voluntarily share threat information, encouraging collaboration and transparency without fear of regulatory or legal consequences. The faster, free exchange of information enables better detection of cyber threats, say experts, quickening response and recovery time after an attack.

In August, the FBI released a warning about two hacker groups targeting Salesforce platforms to access sensitive customer data. Over 700 companies are believed to have been affected so far. Other attacks continue to plague utilities, critical infrastructure and businesses across the private sector, with experts warning there will be no let up any time soon.

Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Related Articles

Q&A: Interpol’s Cybercrime Chief on How AI is Driving Borderless Cyber Threats

EXCLUSIVE INTERVIEW — Anthropic’s announcement that Chinese state-sponsored hackers used its Claude AI technology for a largely automated cyberattack [...] More

Ransomware: Protecting Yourself from Cyber Extortion

Former GCHQ Chief: Cybersecurity, AI, and the New Age of Multilateral Defense

EXPERT INTERVIEW — The last few months have seen a series of major cyber incidents which have frozen airports, crippled companies, compromised [...] More

A New Frontline: How Digital Identity Fraud Redefines National Security Threats

A New Frontline: How Digital Identity Fraud Redefines National Security Threats

DEEP DIVE — From stolen military credentials to AI-generated personas seamlessly breaching critical infrastructure, digital identity fraud is rapidly [...] More

AI-Powered Adversaries Require AI-Driven Defenses

OPINION — The use of artificial intelligence by adversaries has been the subject of exhaustive speculation. No one doubts that the technology will be [...] More

The Hidden National Security Risk in Smart Cities

OPINION — It is worryingly easy to get hold of personal and sensitive data on American military and intelligence personnel. Earlier this year [...] More

A Deniable Attack with Strategic Precision: Why the Red Hat Breach Looks More Like Statecraft Than Mere Crime

EXPERT PERSPECTIVE — The timing was no coincidence.As the U.S. federal government ground to a halt at 12:01 a.m. EDT on October 1, 2025, a [...] More

{{}}