News

After High-Profile Attacks, Biden Calls for Better Software Security

Recent high-profile security attacks have prompted the Biden administration to issue an executive order aiming to tighten software security practices across the board.

The order comes on the heels of a ransomware attack on Colonial Pipeline, which disrupted U.S. East fuel supplies. A Thursday report by Bloomberg stated that Colonial Pipeline paid almost $5 million to the attackers, citing unnamed sources, but it had trouble decrypting the ransomed data after getting the key.

The executive order announced Wednesday called out the Colonial Pipeline attack, as well as the "SolarWinds [and] Microsoft Exchange" security incidents. Several measures are indicated in the executive order. While the measures apply to federal agencies, the aim is to influence private sector practices, too, steered by federal purchasing power.

"We encourage private sector companies to follow the Federal government's lead and take ambitious measures to augment and align cybersecurity investments with the goal of minimizing future incidents," the announcement stated.

The executive order aims to remove contractual barriers to information sharing between IT service providers and the government, although it didn't describe how that task would be accomplished. The order also calls for standardizing federal agencies' responses to cybersecurity incidents.

A Cybersecurity Safety Review Board, combining government officials and the private sector, is getting formed to make recommendations on cybersecurity. It'll be modeled after the National Transportation Safety Board, which reviews airline safety, incidents and crashes.

The order advocates the federal use of zero-trust architectures, with secure use of cloud-based services. Additionally, the order "mandates deployment of multifactor authentication and encryption with a specific time period," although details weren't provided.

The order described establishing a "Government-wide Endpoint Detection and Response (EDR)" system to better share information on security incidents. Federal agencies also are ordered to establish "robust and consistent logging practices."

A pilot program to label software, indicating the degree to which secure software development practices were used, is described in the order. This program might take the form of the current Energy Star program, which oversees energy-efficiency labels.  

About the Author

Kurt Mackie is senior news producer for 1105 Media's Converge360 group.

Featured

  • World Map Image

    Microsoft Taps Nebius in $17B AI Infrastructure Deal To Alleviate Cloud Strain

    Microsoft has signed a five-year, $17.4 billion agreement with Amsterdam-based Nebius Group to expand its AI computing capabilities through third-party GPU infrastructure.

  • Microsoft Brings Copilot AI Into Viva Engage

    Microsoft 365 Copilot in Viva Engage is now generally available, extending Copilot's AI-powered assistant capabilities deeper into the Viva platform.

  • MIT Finds Only 1 in 20 AI Investments Translate into ROI

    Despite pouring billions into generative AI technologies, 95 percent of businesses have yet to see any measurable return on investment.

  • Report: Cost, Sustainability Drive DaaS Adoption Beyond Remote Work

    Gartner's 2025 Magic Quadrant for Desktop as a Service reveals that while secure remote access remains a key driver of DaaS adoption, a growing number of deployments now focus on broader efficiency goals.