{"id":42557,"date":"2021-06-08T00:00:00","date_gmt":"2021-06-08T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/research\/21\/f\/how-to-act-on-the-executive-order-to-tackle-ransomware.html"},"modified":"2021-06-08T00:00:00","modified_gmt":"2021-06-08T00:00:00","slug":"the-u-s-eo-on-ransomware-what-does-it-mean-part-2","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/","title":{"rendered":"The U.S. EO on Ransomware: What Does it Mean? \u2013 Part 2"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/how-to-act-on-the-executive-order-to-tackle-ransomware\/act-on-exec-order.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/how-to-act-on-the-executive-order-to-tackle-ransomware\/act-on-exec-order.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Governments don\u2019t hold all the answers, but they can do a lot to make the digital world a safer place to do business. Now ransomware attacks are starting to impact critical infrastructure and supply chains, the White House is <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/white-house-urges-businesses-to-take-ransomware-crime-seriously\/\" target=\"_blank\" rel=\"noopener\">pushing companies to action<\/a>. This is a good start but what are the implications of its latest open letter to US businesses, urging them to do more to stem the tide of infections?<\/p>\n<p><span class=\"body-subhead-title\">Why now?<\/span><\/p>\n<p>Although multi-nationals and SMBs alike have been targeted with ever greater frequency and success over the past few years, the <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/e\/what-we-know-about-darkside-ransomware-and-the-us-pipeline-attac.html\">Colonial Pipeline attack<\/a> appears to have been a wake-up call for the government. It was followed just days later by a <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/meat-processing-jbs-pulls-plug\/\" target=\"_blank\" rel=\"noopener\">major ransomware-related outage<\/a> at the world\u2019s largest meat processor, impacting food supplies in North America and beyond.<\/p>\n<p>Now Deputy National Security Advisor for Cyber, Anne Neuberger, wants US businesses to step up on cyber-security. \u201cAll organizations must recognize that no company is safe from being targeted by ransomware, regardless of size or location,&#8221; she wrote. &#8220;We urge you to take ransomware crime seriously and ensure your corporate cyber defense match the threat.&#8221;<\/p>\n<p>All companies, regardless of size or sector, should certainly take note. Ransomware attacks have become the number one existential threat to their operations. Supply chains, including just-in-time manufacturing and distribution, have already been weakened due to the pandemic. Now they\u2019re exposed to the threat of serious disruption through ransomware. It\u2019s perhaps no surprise that the <a href=\"https:\/\/www.reuters.com\/technology\/exclusive-us-give-ransomware-hacks-similar-priority-terrorism-official-says-2021-06-03\/\" target=\"_blank\" rel=\"noopener\">White House is gearing up<\/a> to treat these attacks with the same gravity as terrorism.<\/p>\n<p><span class=\"body-subhead-title\">What does best practice look like?<\/span><\/p>\n<p>As the White House suggests, convening leadership teams to address these threats is a must. These teams should start by conducting comprehensive vulnerability assessments of their mission critical operations; their cybersecurity teams that protect them, and use these assessments to build comprehensive ransomware play books and starting testing them immediately. In parallel, organizations should be applying best practices to mitigate ransomware attacks that include:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Prompt software patching<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Use of multi-factor authentication (MFA), especially for RDP servers<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Network segmentation<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Deploy Zero Trust architecture to slow down attackers<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Deploy XDR solutions to enhance visibility and increase response times<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Use Defense-in-depth solutions across endpoint, networks, hybrid cloud servers and email\/gateway layers<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Back-up-Back-up- Back-up using the 3-2-1 rule<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Roll out comprehensive risk-based anti-phishing and security awareness training<\/span><\/li>\n<\/ul>\n<p>Many of these measures are set out in a new <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/e\/the-cybersecurity-executive-order--what-does-it-mean-.html\">Executive Order<\/a> from President Biden, which has some useful best practice advice designed to enhance government and supplier security.<\/p>\n<p><span class=\"body-subhead-title\">How can the government do it better?<\/span><\/p>\n<p>For those ransomware affiliates launching global attacks with impunity, there\u2019s currently little risk with high rewards. That means every year threat actor groups get richer and bolder in their tactics. Mitigating risk of ransomware attacks can only be achieved holistically. Organizations are transferring risk through larger Cyber-insurance policies, however these big payouts can be perpetuating the problem and causing big challenges for insurance companies. They are looking to change their policies or are moving to cancel or restrict their underwriting.<\/p>\n<p>Government can play a broader role to reduce risk. They can increase regulation in hopes it creates risk reducing behaviours, however they could have an even greater impact by incentivizing organizations to take action. This could take the form of grants or no interest loans issued by sector specific agencies to owner operators that adopt the NIST cybersecurity framework or provide them access to lower liability programs in the form reduced tort liability, or limited indemnity. The federal government could also streamline regulation to reduce massive audit burdens and reward organizations through tax incentives.<\/p>\n<p>Changing individual and organizational behaviour is a complex thing. And it will not happen overnight. But by showing how serious they\u2019re taking the issue, the federal government and its industry partners can start to make a positive difference.<\/p>\n<p>Check out my <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/e\/the-cybersecurity-executive-order--what-does-it-mean-.html\">first blog<\/a> where we looked at the three administrative sections and assessed their potential to be \u201cbold changes\u201d that rapidly reduce risk across the federal enterprise. We also assessed the potential impact to the other sectors.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/f\/how-to-act-on-the-executive-order-to-tackle-ransomware.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The White House is urging companies to do more to stem the tide of ransomware attacks now that they are starting to impact critical infrastructure and supply chains. It is a good start, but what will be the implication of this to U.S. businesses? Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42558,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9520,9511,9508,9522,9513,9523,9539],"class_list":["post-42557","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cloud","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-endpoints","tag-trend-micro-research-expert-perspective","tag-trend-micro-research-malware","tag-trend-micro-research-network","tag-trend-micro-research-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The U.S. EO on Ransomware: What Does it Mean? \u2013 Part 2 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The U.S. EO on Ransomware: What Does it Mean? \u2013 Part 2 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-08T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"641\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The U.S. EO on Ransomware: What Does it Mean? \u2013 Part 2\",\"datePublished\":\"2021-06-08T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\\\/\"},\"wordCount\":695,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cloud\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Expert Perspective\",\"Trend Micro Research : Malware\",\"Trend Micro Research : Network\",\"Trend Micro Research : Ransomware\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\\\/\",\"name\":\"The U.S. EO on Ransomware: What Does it Mean? \u2013 Part 2 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2.jpg\",\"datePublished\":\"2021-06-08T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2.jpg\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The U.S. EO on Ransomware: What Does it Mean? \u2013 Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The U.S. EO on Ransomware: What Does it Mean? \u2013 Part 2 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/","og_locale":"en_US","og_type":"article","og_title":"The U.S. EO on Ransomware: What Does it Mean? \u2013 Part 2 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-06-08T00:00:00+00:00","og_image":[{"width":641,"height":350,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The U.S. EO on Ransomware: What Does it Mean? \u2013 Part 2","datePublished":"2021-06-08T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/"},"wordCount":695,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cloud","Trend Micro Research : Cyber Threats","Trend Micro Research : Endpoints","Trend Micro Research : Expert Perspective","Trend Micro Research : Malware","Trend Micro Research : Network","Trend Micro Research : Ransomware"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/","url":"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/","name":"The U.S. EO on Ransomware: What Does it Mean? \u2013 Part 2 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2.jpg","datePublished":"2021-06-08T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2.jpg","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-u-s-eo-on-ransomware-what-does-it-mean-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"The U.S. EO on Ransomware: What Does it Mean? \u2013 Part 2"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42557"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42557\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42558"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}