Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New York Seeking Public Opinion on Water Systems Cyber Regulations

New York Seeking Public Opinion on Water Systems Cyber Regulations

Posted on July 24, 2025July 24, 2025 By CWS

New York State this week opened for public suggestions proposed laws specializing in the cybersecurity of water and wastewater methods.

Launched by the New York State Division of Well being (DOH) and New York State Division of Environmental Conservation (DEC), the paperwork suggest minimal requirements for bettering water infrastructure’s resilience towards refined cyberattacks.

Moreover, the Division of Public Service (DPS) launched proposed cyber laws masking water-works firms, cable tv firms, and different public utilities.

The proposed guidelines are accompanied by a brand new grant program established by the Environmental Amenities Company (EFC) alongside technical help for water and wastewater utilities.

DOH, DEC, and EFC labored collectively to align definitions and provisions inside their necessities, and to make sure that the laws are aligned with CISA and Environmental Safety Company steering on securing IT and OT environments.

Per the proposed guidelines, water and wastewater utilities will probably be required to implement cybersecurity controls, to make sure they’ve environment friendly community monitoring and logging, and to guage dangers inside their environments.

They will even need to implement and preserve incident response plans to make sure they’ll proceed operations within the occasion of a cyberattack, and to report incidents, whereas licensed wastewater operators will probably be required to bear necessary cybersecurity coaching.

Copies of the proposed paperwork have been printed on DEC’s web site. events are required to submit feedback by September 3, 2025. DOH and PSC will settle for suggestions till September 14, 2025.Commercial. Scroll to proceed studying.

“As soon as adopted, regulated entities may have till January 1, 2027 to adjust to DEC and DOH laws centered on operational know-how and till January 1, 2026 to adjust to PSC laws centered on data know-how,” New York State says.

“These sources streamline and spotlight key sector-specific steering, instruments, and coaching to assist regulated wastewater services improve their cyber resilience,” DEC notes.

Water and wastewater services are additionally inspired to benefit from the varied federal and state sources and coaching alternatives, together with free cybersecurity assessments, which are obtainable for them.

The water sector has usually been focused by menace actors in recent times and the US authorities has been taking steps to assist services increase their cyberattack preparedness and resilience.

“Cyberattacks on essential infrastructure can have devastating impacts on communities, and we should act now to defend our water and wastewater methods with the identical urgency and rigor we carry to different essential sectors. These new laws and grant applications replicate our dedication to defending public well being and security whereas serving to under-resourced entities modernize for a digital age,” Governor Kathy Hochul stated.

Associated: EU Unveils AI Code of Apply to Assist Companies Comply With Bloc’s Guidelines

Associated: Encryption Backdoors: The Safety Practitioners’ View

Associated: The ZTNA Blind Spot: Why Unmanaged Gadgets Threaten Your Hybrid Workforce

Associated: New UK Framework Pressures Distributors on SBOMs, Patching and Default MFA

Security Week News Tags:Cyber, Opinion, Public, Regulations, Seeking, Systems, Water, York

Post navigation

Previous Post: New AI-Powered Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy
Next Post: Splunk Details on How to Detect, Mitigate and Respond to CitrixBleed 2 Attack

Related Posts

Creating Realistic Deepfakes Is Getting Easier Than Ever. Fighting Back May Take Even More AI Creating Realistic Deepfakes Is Getting Easier Than Ever. Fighting Back May Take Even More AI Security Week News
Misconfigured HMIs Expose US Water Systems to Anyone with a Browser Misconfigured HMIs Expose US Water Systems to Anyone with a Browser Security Week News
New 0 Cellik RAT Grants Android Control, Trojanizes Google Play Apps New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps Security Week News
Noma Security Raises 0 Million for AI Security Platform Noma Security Raises $100 Million for AI Security Platform Security Week News
Tennessee Man Pleads Guilty to Repeatedly Hacking Supreme Court’s Filing System Tennessee Man Pleads Guilty to Repeatedly Hacking Supreme Court’s Filing System Security Week News
‘SolyxImmortal’ Information Stealer Emerges – SecurityWeek ‘SolyxImmortal’ Information Stealer Emerges – SecurityWeek Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News