
Nevada Issues First Statewide Data Classification Policy After Major Cyber Incident
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

Pentagon presses top AI firms for broader access on classified networks, raising safety and policy alarms
The U.S. Department of Defense is pressing leading generative-AI vendors to allow their models to operate with fewer vendor-imposed constraints on classified networks to accelerate battlefield utility. That push collides with broader industry trends—infrastructure concentration, global competition and fractured regulation—which complicate procurement, supply-chain trust and governance for secure deployments.
White House cyber office moves to embed security into U.S. AI stacks
The Office of the National Cyber Director is developing an AI security policy framework to bake defensive controls into AI development and deployment chains, coordinating with OSTP and informed by recent automated threat activity. The effort intersects with broader debates about AI infrastructure — including calls for shared public compute, interoperability standards, and certification regimes — that could shape how security requirements are funded, enforced and scaled.

U.S. Signals Tighter Cyber Retaliation Tied to Adversary Moves, Seeks Industry Coordination
A senior cyber policy official said the forthcoming national cyber strategy will tie U.S. responses in cyberspace to the demonstrable actions of foreign adversaries and broaden coordination with industry, subnational governments and other policy offices — including work to harden AI stacks and infrastructure that officials see as increasingly targeted by automated campaigns.
Patch Rush, Penalties and Power Plays: This Week’s Cybersecurity Events
A fast-exploited Fortinet flaw and an agentic-AI vulnerability in ServiceNow forced urgent remediation, while telecoms, a university, and a logistics provider faced data and security crises that drew enforcement and public scrutiny. National agencies issued OT and zero-trust guidance and investors poured $136M into defense-focused software, highlighting shifting incentives toward resilience and regulatory accountability.
Nigeria to Require Minimum Cybersecurity Spending as AI-augmented Attacks Grow
Nigeria will introduce a national cybersecurity framework this year that forces organizations to meet baseline security spending levels as AI-enhanced attacks and large-scale service disruptions have multiplied. The move could combine with parallel tightening of fintech and payments supervision to raise compliance costs and create a need for regulatory coordination to avoid undue strain on smaller firms and startups.
U.S. report: State privacy laws fail to stop data brokers from exposing public servants
A new analysis finds that current state consumer privacy statutes leave public employees vulnerable by permitting data brokers to buy and sell personal information harvested from public records. Researchers link this gap to a growing pattern of online threats and harassment against local officials, and urge targeted legal fixes to shrink the 'data-to-violence' pathway.
White House Revokes Prior Software Security Mandates, Shifts Risk Authority to Agencies
The Office of Management and Budget issued memorandum M-26-05, rescinding earlier centralized software security directives and returning responsibility for software and hardware security policy to individual agency leaders. The guidance encourages agency-specific, risk-based controls and expands attention to hardware supply chain risks while making previous attestations and component inventories optional rather than mandatory.
U.S. CIOs Confront Rising Liability as State and Federal AI Rules Diverge
Divergent state and federal AI rules are forcing CIOs to balance deployment speed against layered legal exposure that can include state fines, federal enforcement and private suits. Practical mitigation now combines cross‑functional governance, authenticated data flows and architecture-level controls so organizations can preserve market access and reduce remediation costs later.