{"id":58022,"date":"2025-01-17T20:23:12","date_gmt":"2025-01-17T20:23:12","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/"},"modified":"2025-01-17T20:23:12","modified_gmt":"2025-01-17T20:23:12","slug":"biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/","title":{"rendered":"Biden signs sweeping cybersecurity order, just in time for Trump to gut it"},"content":{"rendered":"<p><span class=\"label\">Analysis<\/span> Joe Biden, in the final days of his US presidency, issued another cybersecurity order that is nearly as vast in scope as it is late in the game.<\/p>\n<p>The sweeping directive, signed Thursday, covers a <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2025\/01\/16\/executive-order-on-strengthening-and-promoting-innovation-in-the-nations-cybersecurity\/\">range of topics<\/a> including securing federal communications networks against foreign snoops, issuing tougher sanctions for ransomware gangs, requiring software providers to develop more secure products, and using AI to boost America&#8217;s cyber defense capabilities, among others.<\/p>\n<p>This latest presidential mandate follows a year of <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/12\/31\/china_cyber_intrusions_2024\/\" rel=\"noopener\">unprecedented attacks<\/a> by Chinese government spies who have been spotted <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/02\/01\/china_attack_warning\/\" rel=\"noopener\">lurking<\/a> in federal and telecommunications networks and burrowing into critical infrastructure to prep for future destructive cyberattacks.&nbsp;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Additionally, <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/02\/29\/alphv_change_healthcare\/\" rel=\"noopener\">ransomware criminals<\/a> disrupted <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/02\/22\/change_healthcare_outage\/\" rel=\"noopener\">thousands of pharmacies and hospitals<\/a> across the US and stole sensitive information belonging to around <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/10\/27\/senator_domain_registrars_russia_disinfo\/\" rel=\"noopener\">100 million people<\/a> after locking up Change Healthcare&#8217;s systems in February.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>Also on Thursday, Microsoft <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2025\/01\/16\/russia_star_blizzard_whatsapp\/\" rel=\"noopener\">warned<\/a> that the Russian Federal Security Service&#8217;s online arm was back with a new data-stealing phishing campaign despite the feds and Microsoft seizing or taking down more than 180 websites related to that activity since October.<\/p>\n<p>And it comes just days before Donald Trump becomes America&#8217;s 47th president, despite many of the deadlines stretching well into the new administration&#8217;s takeover.<\/p>\n<blockquote class=\"pullquote\" readability=\"5\">\n<p>It&#8217;s a bit of a Hail Mary designed to include everything possible and just see what sticks<\/p>\n<\/blockquote>\n<p>While the US is facing serious cyber threats from nation states and financially motivated criminals alike, several of the executive order&#8217;s components may be dead on arrival.<\/p>\n<p>&#8220;Given the timing right before a change in the administration, I can&#8217;t help but think it&#8217;s a bit of a Hail Mary designed to include everything possible and just see what sticks,&#8221; Wallarm security strategist Tim Erlin told <em>The Register<\/em>.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>&#8220;It&#8217;s important to keep in mind that these executive orders, while sweeping in their intentions, are limited in scope and often significantly delayed in their timing,&#8221; he added. &#8220;For example, the requirement for government procurement using the recently ratified Cyber Trust Mark doesn&#8217;t take effect until 2027. A lot can change with cybersecurity in two years.&#8221;<\/p>\n<h3 class=\"crosshead\">Securing software supply chains<\/h3>\n<p>A big chunk of the order addresses the need to better <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/03\/03\/us_national_cybersecurity_strategy\/\" rel=\"noopener\">secure software supply chains<\/a> and using the <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/04\/05\/microsoft_government_contracts\/\" rel=\"noopener\">government&#8217;s procurement power<\/a> to ensure this happens. It references Biden&#8217;s earlier cybersecurity directive, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\">executive order 14028<\/a>, signed in May 2021 during his first year in office.&nbsp;<\/p>\n<p>This led the development of secure software development practices, required software companies to demonstrate compliance with those practices, and then told federal agencies that they could only use software from providers that attest to using those best practices.<\/p>\n<p>Still, &#8220;in some instances, providers of software to the federal government commit to following cybersecurity practices, yet do not fix well-known exploitable vulnerabilities in their software, which puts the Government at risk of compromise,&#8221; the EO says.&nbsp;<\/p>\n<p>To address these issues, the cybersecurity directive mandates that software companies which sell to the government must submit proof to CISA that they are following secure software development practices.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>It also requires the federal government to come up with a &#8220;coordinated set of practical and effective security practices to require when it procures software&#8221; \u2013 essentially minimum cybersecurity requirements.<\/p>\n<p>Plus, it directs the National Institute for Standards and Technology (NIST) to provide guidance on how to securely deploy patches and software updates, and directs several heads of government agencies including CISA to issue recommendations on patching open source software and best practices for contributing to open source projects.<\/p>\n<p>These federal procurement requirements are likely to see pushback from the software industry \u2013 and possibly a complete rollback from Trump, who is not a fan of regulations.<\/p>\n<p>&#8220;Obviously, the lobbyists are going to fight tooth and nail&#8221; to eliminate the extra steps software makers must take to prove their products are secure, Tom Kellermann, global fellow for cyber policy at the Wilson Center, told <em>The Register<\/em>.<\/p>\n<p>Still, he added, the presidential order is &#8220;missing something.&#8221;<\/p>\n<p>&#8220;It should mandate that you have to be able to continuously monitor your code, your applications, for behavioral anomalies, i.e. zero-days,&#8221; Kellermann said. &#8220;Like continuously monitoring, in real time, and runtime, in production. Not you scan it in development and you show me an attestation that you do that. The whole reason why the Chinese and Russians are getting in all the time is because of zero-days.&#8221;<\/p>\n<h3 class=\"crosshead\">Securing federal networks<\/h3>\n<p>Another major piece of the EO involves securing federal networks and systems following a series of intrusions by both <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/04\/12\/microsoft_cisa_order\/\" rel=\"noopener\">Russia<\/a> and <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2025\/01\/10\/china_treasury_foreign_investment\/\" rel=\"noopener\">China<\/a> into government IT systems and devices.&nbsp;<\/p>\n<p>This section requires agencies to use phishing-resistant authentication standards such as WebAuthn.<\/p>\n<p>It directs the Department of Defense and Homeland Security to &#8220;establish procedures to immediately share threat information&#8221; while strengthening CISA&#8217;s &#8220;capability to hunt for and identify threats across FCEB agencies.&#8221; Both of these aim to speed up the government&#8217;s hunting and identification of new threats before they move across government networks.<\/p>\n<p>The EO also says government agencies must enable transport encryption by default across email, instant messaging, and internet-based voice and video conferencing. But it stops short of <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2025\/01\/04\/encryption_backdoor_debate\/\" rel=\"noopener\">mandating end\u2013to-end encryption<\/a> to protect secure communications and instead says agencies shall &#8220;where technically supported, use end-to-end encryption by default while maintaining logging and archival capabilities that allow agencies to fulfill records management and accountability requirements.&#8221;<\/p>\n<blockquote class=\"pullquote\" readability=\"5\">\n<p>True privacy and security demands end-to-end encryption. The President&#8217;s EO misses the mark<\/p>\n<\/blockquote>\n<p>This, according to Virtru CEO John Ackerly, who worked in the George W Bush White House as a tech advisor, is another missed opportunity for the Biden administration.<\/p>\n<p>Ackerly pointed to the order&#8217;s &#8220;multiple mentions&#8221; of transport layer security, or TLS. &#8220;While maybe unsurprising given the continued hedging from the outgoing administration and the FBI on this topic, the silence on end-to-end encryption is deafening,&#8221; he told <em>The Register<\/em>. &#8220;TLS only protects data in transit \u2013 and it is only in transit for an instant.&#8221;<\/p>\n<p>Following the Salt Typhoon attacks that compromised US telcos and allowed Beijing-backed spies to &#8220;<a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/12\/30\/att_verizon_confirm_salt_typhoon_breach\/\" rel=\"noopener\">record phone calls at will<\/a>,&#8221; the FBI and CISA advised people to use &#8220;responsible encryption.&#8221;<\/p>\n<p>&#8220;In a world where bad actors are attacking the US on a daily basis, &#8216;responsible encryption&#8217; and TLS is simply not enough,&#8221; Ackerly said. &#8220;True privacy and security demands end-to-end encryption. This is not debatable. The President&#8217;s EO misses the mark.&#8221;<\/p>\n<h3 class=\"crosshead\">Securing AI and AI-enabled security<\/h3>\n<p>AI gets its own section in the EO, titled &#8220;Promoting Security with and in Artificial Intelligence.&#8221; The directive sets several AI-related deadlines and mandates a public-private collaboration and pilot program on using AI for cyber defense in the energy sector.<\/p>\n<p>It also mandates a new DOD program to deploy advanced models for cyber defense and prioritizes funding for research into AI-assisted cybersecurity.<\/p>\n<p>&#8220;While AI for cyber defense is a must, it introduces risks like algorithmic bias, adversarial attacks, data leakage, and over-reliance on technology without human oversight and proper regulation in place,&#8221; cautioned Gabrielle Hempel, a customer solutions engineer at Exabeam.<\/p>\n<p>And then on the other side of AI security \u2013 securing the software and models themselves \u2013 the order requires the DOD, Homeland Security, and Directors of National Intelligence and Office of Management and Budget to incorporate the management of AI software vulnerabilities into their processes.<\/p>\n<p>It also calls for these agencies to do a better job coordinating &#8220;vulnerability management, including through incident tracking, response, and reporting, and by sharing indicators of compromise for AI systems.&#8221;<\/p>\n<p>Hempel says the EO &#8220;looks strong on paper,&#8221; but adds that many plans do. &#8220;How feasible is it to implement? With the way the federal government moves, there will be an entirely new attack landscape before it is implemented,&#8221; she warned.<\/p>\n<p>For example, another section of the EO encourages the use of digital identity documents to access public benefit programs as a means to combat stolen and fake identities used by criminals in digital fraud schemes.<\/p>\n<p>&#8220;Digital identity frameworks are a great step as many other countries are already using and governing them,&#8221; Hempel said. &#8220;However, I raise the same question as all other technology implementations the government has: how will we ensure data privacy and not open a vast amount of new attack vectors in implementing this?&#8221;<\/p>\n<p>While the EO mentions securing federal systems, &#8220;there is a stark lack of focus on securing critical infrastructure sectors and bridging the gap between public-private infrastructure,&#8221; Hempel noted. &#8220;Federal security is only one piece of the puzzle, and, frankly, not where the greatest vulnerability lies.&#8221; \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2025\/01\/17\/biden_cybersecurity_eo\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware, AI, secure software, digital IDs \u2013 there&#8217;s something for everyone in the presidential directive Analysis\u00a0 Joe Biden, in the final days of his US presidency, issued another cybersecurity order that is nearly as vast in scope as it is late in the game.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-58022","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Biden signs sweeping cybersecurity order, just in time for Trump to gut it 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biden signs sweeping cybersecurity order, just in time for Trump to gut it 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-17T20:23:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Biden signs sweeping cybersecurity order, just in time for Trump to gut it\",\"datePublished\":\"2025-01-17T20:23:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\\\/\"},\"wordCount\":1425,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_onprem\\\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\\\/\",\"name\":\"Biden signs sweeping cybersecurity order, just in time for Trump to gut it 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_onprem\\\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2025-01-17T20:23:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_onprem\\\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_onprem\\\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Biden signs sweeping cybersecurity order, just in time for Trump to gut it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biden signs sweeping cybersecurity order, just in time for Trump to gut it 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/","og_locale":"en_US","og_type":"article","og_title":"Biden signs sweeping cybersecurity order, just in time for Trump to gut it 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-01-17T20:23:12+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Biden signs sweeping cybersecurity order, just in time for Trump to gut it","datePublished":"2025-01-17T20:23:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/"},"wordCount":1425,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/","url":"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/","name":"Biden signs sweeping cybersecurity order, just in time for Trump to gut it 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2025-01-17T20:23:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_onprem\/publicsector&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Z4rAuIlS8HM4nGsYEjY0ZAAAAMo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/biden-signs-sweeping-cybersecurity-order-just-in-time-for-trump-to-gut-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Biden signs sweeping cybersecurity order, just in time for Trump to gut it"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=58022"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58022\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=58022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=58022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=58022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}