Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
White House Scraps ‘Burdensome’ Software Security Rules 

White House Scraps ‘Burdensome’ Software Security Rules 

Posted on January 30, 2026January 30, 2026 By CWS

The White Home has introduced that software program safety steerage issued in the course of the Biden administration has been rescinded as a consequence of “unproven and burdensome” necessities that prioritized administrative compliance over significant safety investments.

The US Workplace of Administration and Funds (OMB) has issued Memorandum M-26-05, formally revoking the earlier administration’s 2022 coverage, ‘Enhancing the Safety of the Software program Provide Chain by way of Safe Software program Growth Practices’ (M-22-18), in addition to the follow-up enhancements introduced in 2023 (M-23-16).

The brand new steerage shifts duty to particular person company heads to develop tailor-made safety insurance policies for each software program and {hardware} based mostly on their particular mission wants and threat assessments. 

“Every company head is in the end accountable for assuring the safety of software program and {hardware} that’s permitted to function on the company’s community,” reads the memo despatched by the OMB to departments and companies. 

“There is no such thing as a common, one-size-fits-all technique of attaining that end result. Every company ought to validate supplier safety using safe growth ideas and based mostly on a complete threat evaluation,” the OMB added.

Whereas companies are now not strictly required to take action, they could proceed to make use of safe software program growth attestation kinds, Software program Payments of Supplies (SBOMs), and different assets described in M-22-18. Commercial. Scroll to proceed studying.

It’s price noting that the US authorities and its allies not too long ago launched new steerage on some great benefits of widespread SBOM adoption.

M-26-05 additionally expands company focus to incorporate {hardware} provide chain threats, encouraging using {Hardware} Invoice of Supplies (HBOM) frameworks to make sure broader resilience in opposition to subtle menace actors.

Associated: UK Authorities Unveils New Cyber Motion Plan

Associated: New Stories Reinforce Cyberattack’s Position in Maduro Seize Blackout

Associated: Cybersecurity Companies React to China’s Reported Software program Ban

Security Week News Tags:Burdensome, House, Rules, Scraps, Security, Software, White

Post navigation

Previous Post: Attackers Using Hugging Face Hosting to Deliver Android RAT Payload
Next Post: NVIDIA GPU Display Driver Vulnerabilities Allows Code Execution and Privilege Escalation

Related Posts

Microsoft Addresses Six Zero-Day Vulnerabilities in February 2026 Update Microsoft Addresses Six Zero-Day Vulnerabilities in February 2026 Update Security Week News
Data Breach at Doctors Imaging Group Impacts 171,000 People Data Breach at Doctors Imaging Group Impacts 171,000 People Security Week News
Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw Security Week News
Going Into the Deep End: Social Engineering and the AI Flood Going Into the Deep End: Social Engineering and the AI Flood Security Week News
Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack Security Week News
Black Hat USA 2025 – Summary of Vendor Announcements (Part 3) Black Hat USA 2025 – Summary of Vendor Announcements (Part 3) Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News