{"id":50748,"date":"2023-02-24T20:41:51","date_gmt":"2023-02-24T20:41:51","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34358\/Biden-Push-For-Cyber-Regulations-Could-Clash-With-Skeptical-Republicans.html"},"modified":"2023-02-24T20:41:51","modified_gmt":"2023-02-24T20:41:51","slug":"biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/","title":{"rendered":"Biden Push For Cyber Regulations Could Clash With Skeptical Republicans"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/02\/Kemba-e1677264040864.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>A White House cybersecurity official expressed confidence that the U.S. can solve many of its systemic cybersecurity problems, but stressed that the public and private sectors will \u201conly be able to do it together\u201d while hinting the Biden administration could look to Congress to impose additional authorities.<\/p>\n<p>The Office of the National Cyber Director is in the final stages of completing a new national cyber strategy <a href=\"https:\/\/www.scmagazine.com\/news\/critical-infrastructure\/what-to-expect-from-the-upcoming-national-cyber-strategy\" target=\"_blank\" rel=\"noreferrer noopener\">that is expected to call<\/a> for a more robust regulatory approach in pushing the private sector to build more secure products by design and impose basic cybersecurity protections for users.<\/p>\n<p>Matt Cronin, director of national cybersecurity operations and planning at the Office of the National Cyber Director, said Friday that the administration\u2019s message was ultimately \u201ca message of hope\u201d as well as &#8220;a call to action&#8221; about the ability of government, the private sector and individuals to tackle the great challenges of their time.<\/p>\n<p>He compared the administration\u2019s vision to other problems \u2014 like the <a rel=\"noreferrer noopener\" href=\"https:\/\/millercenter.org\/the-presidency\/educational-resources\/space-race\" target=\"_blank\">space race<\/a>, <a href=\"https:\/\/history.army.mil\/documents\/mobpam.htm\">mobilization<\/a> during World War II and <a rel=\"noreferrer noopener\" href=\"https:\/\/www.leg.state.nv.us\/Session\/79th2017\/Exhibits\/Senate\/GA\/SGA468G.pdf\" target=\"_blank\">rearchitecting city codes and regulations<\/a> to prevent great fires \u2014 that required similar whole-of-society efforts to solve and pushed back against the idea that the U.S. government was incapable of meeting the administration\u2019s lofty ambitions for changing the cyber landscape for the better.<\/p>\n<p>\u201cWe are a nation that put a man on the moon. You don\u2019t think we\u2019re capable of stopping some rando Russian from hacking a school? No, we absolutely can and we absolutely will, [but] there\u2019s a caveat to that: it will only work if we do it together,\u201d said Cronin while appearing on the Resilient Cyber Podcast, hosted by Aquia co-founder and CISO Chris Hughes and Dr. Nikki Robinson.<\/p>\n<p>Sources who have seen different drafts of the strategy told SC Media earlier this month that the administration will seek to leverage existing regulatory authorities where it can, while also considering new legislation to impose mandatory requirements in industries or sectors where those authorities are weaker.<\/p>\n<p>Cronin likened creating a resilient cyber infrastructure and secure-by-design principles in a liberal democracy to \u201chard mode\u201d in a video game, noting that authoritarian governments don\u2019t have to balance their digital security priorities with the private property rights or civil liberties of its citizenry the same way the U.S. and other democracies do.<\/p>\n<p>But he also suggested that if private sector entities weren\u2019t willing to come to the table and work with the government on these problems voluntarily, Congress may step to compel further action, saying \u201cyou cannot secure a liberal democracy if we\u2019re all just out on our own [and] out for ourselves. It simply will not work.\u201d<\/p>\n<p>\u201cIf every company, every executive, every individual, every government agency decides \u2018it\u2019s not my problem, I\u2019m not going to disclose a breach or I\u2019m not going to be secure by design, it\u2019s too expensive,\u201d then yeah, it\u2019s going to take a lot longer. And honestly I\u2019m going to guess \u2014 I\u2019m not speaking for Congress \u2014 they\u2019re going to create way more laws to increase the burden until people get it.\u201d<\/p>\n<h2>Republicans on the Hill may not play ball<\/h2>\n<p>However, any push in the near term for new regulations or federal powers is likely to run headlong into a Republican-controlled House that has thus far shown little interest in facilitating the administration\u2019s ambitious cyber agenda.<\/p>\n<p>This week, House Homeland Committee Chair Mark Green, R-Tenn., sent reporters a statement blasting the Biden administration\u2019s \u201cscattershot cybersecurity regulations\u201d while praising a <a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/Draft%20NSTAC%20Strategy%20for%20Increasing%20Trust%20Report%20%281-31-23%29_508.pdf?wpisrc=nl_cybersecurity202\">recent report<\/a> by the<a href=\"https:\/\/www.scmagazine.com\/analysis\/leadership\/biden-taps-experts-in-threat-intel-networking-and-satellite-cybersecurity-for-telecom-advisory-board\"> industry-led National Security Telecommunications Advisory Board<\/a> urging the administration to spend more time harmonizing existing cyber mandates on the private sector.<\/p>\n<p>\u201cWhile we continue to wait in anticipation for the release of the National Cyber Strategy, which I am concerned will strike the exact opposite tone by encouraging more regulation, I\u2019m glad to see that the NSTAC recommends that the national cyber director work to resolve and streamline duplicative and burdensome regulatory obligations, most of which stem from the White House push for cross-sector mandates,\u201d Green said. \u201cI look forward to pursuing strong oversight over this administration\u2019s scattershot cybersecurity regulations this Congress and I look forward to working with CISA to ensure the red tape doesn\u2019t strangle industry as they complete the congressionally mandated Cyber Incident Reporting for Critical Infrastructure Act rulemaking.\u201d<\/p>\n<p>Not every congressional Republican appears dead set against the prospects of additional cyber mandates. A <a href=\"https:\/\/www.congress.gov\/bill\/118th-congress\/house-bill\/1148?s=2&amp;r=1&amp;q=%7B%22search%22%3A%5B%22cyber%22%5D%7D\" target=\"_blank\" rel=\"noreferrer noopener\">bill introduced this week<\/a> by Rep. Tim Walberg, R-Mich., would charge the Department of Energy with setting up new cyber incident reporting regulations for electrical critical infrastructure. A law passed last year empowered the Cybersecurity and Infrastructure Security Agency to set up similar reporting regulations for all critical infrastructure sectors, including the energy sector.<\/p>\n<p>The text of the bill and its details have yet to be made public on Congress.gov. Walberg\u2019s office did not respond to requests from SC Media for a copy of the bill or questions about possible overlap between potential Energy reporting requirements and CISA\u2019s parallel incident reporting regime.<\/p>\n<p>Even if Congress is reluctant to pass new legislation, many U.S. companies may find themselves compelled to impose similar mandates in order to do business in other countries and markets.<\/p>\n<p>As an example, a representative from one U.S.-based industry lobbying group pointed to <a href=\"https:\/\/www.politico.eu\/article\/new-cyber-act-to-raise-safety-standards-across-the-bloc\/\" target=\"_blank\" rel=\"noreferrer noopener\">new legislation under consideration<\/a> by the European Union that would require certain technology products to meet a minimum level of cybersecurity checks and impose fines of \u20ac15 million or more on violators, regardless of whether their products are produced in Europe or elsewhere.<\/p>\n<p>Those rules and others could force larger companies with a global footprint and customer base into making many of the same changes the Biden administration is seeking.<\/p>\n<p>\u201cWhen regulatory trains get moving down the track in Europe, they don\u2019t get derailed the way they\u2019re often derailed in Congress here,\u201d the official said, who spoke to SC Media under the condition of anonymity because they were not authorized to comment on the U.S. cyber strategy until it has been officially released. \u201cThat\u2019s just a reality, so that\u2019s going to happen and that\u2019s why I think most people will have an open mind to [regulation] and say \u2018OK, let\u2019s have an honest conversation about what actually makes sense and what we need.\u2019\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34358\/Biden-Push-For-Cyber-Regulations-Could-Clash-With-Skeptical-Republicans.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":50749,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[372],"class_list":["post-50748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Biden Push For Cyber Regulations Could Clash With Skeptical Republicans 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biden Push For Cyber Regulations Could Clash With Skeptical Republicans 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-24T20:41:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/02\/Kemba-e1677264040864.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Biden Push For Cyber Regulations Could Clash With Skeptical Republicans\",\"datePublished\":\"2023-02-24T20:41:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/\"},\"wordCount\":1079,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans.jpg\",\"keywords\":[\"headline,government,usa\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/\",\"name\":\"Biden Push For Cyber Regulations Could Clash With Skeptical Republicans 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans.jpg\",\"datePublished\":\"2023-02-24T20:41:51+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans.jpg\",\"width\":1280,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusa\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Biden Push For Cyber Regulations Could Clash With Skeptical Republicans\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biden Push For Cyber Regulations Could Clash With Skeptical Republicans 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/","og_locale":"en_US","og_type":"article","og_title":"Biden Push For Cyber Regulations Could Clash With Skeptical Republicans 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-02-24T20:41:51+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/02\/Kemba-e1677264040864.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Biden Push For Cyber Regulations Could Clash With Skeptical Republicans","datePublished":"2023-02-24T20:41:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/"},"wordCount":1079,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans.jpg","keywords":["headline,government,usa"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/","url":"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/","name":"Biden Push For Cyber Regulations Could Clash With Skeptical Republicans 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans.jpg","datePublished":"2023-02-24T20:41:51+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans.jpg","width":1280,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/biden-push-for-cyber-regulations-could-clash-with-skeptical-republicans\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusa\/"},{"@type":"ListItem","position":3,"name":"Biden Push For Cyber Regulations Could Clash With Skeptical Republicans"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=50748"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50748\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/50749"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=50748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=50748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=50748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}