
Trump Drops A Cybersecurity Bombshell With Biden-Era Policy Reversal
Less than 24 hours after President Trump's public feud with Elon Musk, a new cybersecurity executive order was issued on June 6, 2025, introducing major revisions to the Biden administration's final cybersecurity directives. The order not only modifies key elements of Biden's January 2025 framework but also signals a broader realignment of federal cybersecurity priorities. It shifts focus away from federal digital identity initiatives and revises compliance-heavy software security mandates.
Officially titled 'Sustaining Select Efforts To Strengthen The Nation's Cybersecurity And Amending Executive Order 13694 And Executive Order 14144,' the order represents a strategic departure from prior approaches, emphasizing operational pragmatism over regulatory expansion. Notably, it comes at a time when President Trump's nominee to lead the Cybersecurity And Infrastructure Security Agency, Sean Plankey, has yet to be confirmed due to opposition and delay tactics from both sides of the aisle.
President Biden's Executive Order 14144 was issued on January 16, 2025, just four days before President Trump's inauguration. It was interpreted by many observers as an effort to define long-term cybersecurity direction before the change in administration. The order included measures to bolster software supply chain security, expand digital identity infrastructure and accelerate post-quantum cryptography adoption. However, this latest Trump order criticized several of these elements as overreaching or insufficiently vetted, characterizing them as 'problematic and distracting' and specifically noting that they were 'sneaked' into policy in the final hours of Biden's presidency. The language used in the accompanying fact sheet is unusually blunt for a federal document, suggesting a clear intent to publicly distance the new administration from its predecessor's policy posture.
1. Attribution Of Threats: Direct Language On Foreign Cyber Aggressors
The executive order opens with unusually direct language, identifying the People's Republic of China as the most 'active and persistent' cyber threat to U.S. government systems, private sector networks and critical infrastructure. It also names Russia, Iran and North Korea as continuing sources of malicious cyber activity. This blunt attribution departs from the more generalized threat descriptions of previous administrations. By naming adversaries explicitly in the policy preamble, the administration signals a shift toward greater transparency in threat acknowledgment and a hardening of posture. The message is clear: U.S. cyber strategy is now being framed not only by evolving technologies but by intensifying geopolitical realities.
2. Software Security Compliance: Shifting From Mandated Attestations To Voluntary Implementation: Biden's order imposed a layered framework requiring federal contractors to submit attestations, artifacts and documentation tied to NIST's Secure Software Development Framework. Some would say that these requirements risked turning development teams into compliance teams. Trump's order eliminates attestations entirely. NIST will still provide guidance through the National Cybersecurity Center Of Excellence, but reporting is no longer mandatory. This reflects a shift toward flexibility over formality.
3. Digital Identity Verification: A Full Repeal Rooted In Fiscal And Legal Concerns: The Biden administration had envisioned digital credentials as a gateway to streamlined government services. Trump's order reverses course, citing concerns about entitlement fraud and improper access. The fact sheet explicitly warns that Biden's policy could have enabled unauthorized immigrants to obtain digital IDs. As a result, pilots on interoperability and identity federation are halted.
4. Artificial Intelligence In Cybersecurity: Tighter Focus On Defense And Vulnerability Management: Biden's order encouraged AI-driven collaboration across academia and industry. Trump's order takes a narrower view. It requires agencies to track vulnerabilities in AI systems, integrate them into incident response pipelines and limit data sharing to only what is feasible under security and confidentiality constraints. AI is repositioned as a potential liability to be secured, not a universal defense engine.
5. Post-Quantum Cryptography: A Deadline Remains But The Path Is Streamlined
While both administrations agree on the risk posed by quantum computing, Trump's order simplifies the roadmap. By December 2025, CISA and NSA must publish a list of product categories ready for quantum-safe encryption. TLS 1.3 or its successor must be adopted by 2030. Oversight is split between NSA for national security systems and OMB for civilian agencies.
6. Cyber Sanctions Policy: A Narrowed Scope
One of the more politically sensitive changes lies in how sanctions are applied. Biden's order allowed for cyber sanctions against any person involved in disinformation or cyber-enabled threats. Trump's revision limits this to foreign persons only. Domestic political activity is explicitly excluded, a move the administration describes as a safeguard against misuse of cyber enforcement tools.
Initial industry feedback has been swift. The executive order's reorientation of cybersecurity priorities is already reverberating across the federal ecosystem, private sector and innovation community. From compliance-light procurement to a tighter national focus on AI risk, the changes are reshaping expectations.
Defense integrators and established IT vendors are among the most immediate beneficiaries. By removing detailed compliance documentation, particularly attestations tied to secure software development, the order reduces friction in procurement and lowers operational risk. Contract cycles may accelerate as audit-readiness gives way to implementation focus. This shift rewards incumbents with mature delivery models and embedded federal relationships.
With CISA's role redefined and federal oversight of digital identity rolled back, state and local governments may gain more autonomy to design cybersecurity programs that fit local contexts. For well-resourced jurisdictions, this could spur innovation. But for others, especially those lacking talent or funding, decentralization could create new coordination gaps. Additional federal guidance may be needed to prevent fragmentation in national critical infrastructure protection.
For enterprises, the EO's elimination of standardized compliance frameworks is a mixed bag. Under the previous EO, the bar for secure software delivery was clear, particularly for organizations that invested in transparency and attestation. Without a common benchmark, proving trustworthiness becomes more subjective.
Kevin Bocek, CyberArk's Senior Vice President of Innovation, emphasized that the industry is entering a new era of cybersecurity not only dominated by AI and automation, but also by emerging risks that are not yet widely addressed.
'It is affirming that the EO is serious about safe and secure AI, hopefully laying the foundation to critically address one of the most urgent and overlooked threats: machine identity sprawl,' Bocek noted.
According to CyberArk, machine identities now outnumber human identities 82 to 1 within enterprises, yet 68% of organizations lack security controls to protect them. Without federal guidance and clear identity accountability, Bocek warns that this vulnerability could become a significant blind spot in national cybersecurity. His comments underscore the risk of prioritizing operational efficiency over foundational security controls, a concern shared by many CISOs facing exponential identity growth from cloud and AI platforms.
Digital identity initiatives long supported by privacy advocates, civic technologists and digital modernization leaders were seen as critical to enabling secure, user-friendly access to government services. They aimed to streamline verification, reduce fraud and close equity gaps in federal access. The Biden administration had embraced digital IDs as the backbone of modern digital government.
The Trump administration, however, rescinded these efforts. The accompanying fact sheet expressed concerns that digital identity mandates could be exploited to extend entitlements improperly, particularly to unauthorized immigrants. This decision reflects a broader skepticism toward centralized identity infrastructure and a desire to limit the federal government's role in managing citizen-level credentials.
The Biden-era policy positioned artificial intelligence as a strategic asset for defense, encouraging public-private collaboration, dataset sharing and predictive threat detection at scale. The Trump administration's new directive narrows that scope significantly.
Instead of promoting AI as a systemwide defense multiplier, the EO limits AI's use to managing system vulnerabilities and tracking indicators of compromise. This reflects concerns about over-reliance on technologies that are still evolving, opaque and in some cases unregulated. As Bocek noted, 'Proper AI development is a tool for predictive defense,' but without protections for the AI itself, it could become a new risk vector. The administration's position is clear: AI should be secured before it is scaled.
This AI reframing also signals a philosophical divergence between leveraging AI as a force for innovation versus containing it as a potential liability. Whether that caution slows adoption or increases security maturity remains to be seen, but the message is unambiguous: the era of unchecked AI optimism in federal cybersecurity is over.
This executive order is not a one-off. It is part of a broader realignment consistent with the principles laid out in Project 2025, a policy blueprint advocating for streamlined federal governance, stronger executive control, and targeted decentralization of agency authority. More orders are expected, particularly in areas such as offensive cyber capabilities, state-level infrastructure resilience, and the restructuring of agencies like CISA.
Trump's June 2025 cybersecurity order is more than a policy shift. it is a recalibration of federal cyber strategy that prioritizes execution over oversight, industry collaboration over mandates, and sovereignty over standardization. For industry leaders, innovators, and government stakeholders alike, the takeaway is clear: cybersecurity is no longer just about compliance. It is about preparedness, adaptability, and national competitiveness in an AI-driven world.
The next wave of policy will not be about fine-tuning compliance frameworks but will be about defending digital sovereignty. Those who can pivot fastest, and secure what matters most, will shape the next chapter of America's cyber future.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
35 minutes ago
- Yahoo
1 Megacap Tech Stock That Could Split Its Shares Next
Netflix shares trade significantly higher than the levels they did before the company's last stock split in 2015. The company's business is firing on all cylinders, making this a good time to split shares. Netflix expects double-digit revenue growth and significant operating margin expansion this year. 10 stocks we like better than Netflix › Netflix (NASDAQ: NFLX) stock has recently blown past $1,200 per share, making it hard to believe that shares traded at levels below $200 as recently as May of 2022. And the stock's momentum is strong this year, too. Shares are up about 40% this year alone, defying the market's sluggish return of less than 2% as of this writing. With a combination of a strong business, impressive stock price momentum, and a share price in the thousands, a stock split could be in the cards for the streaming giant soon. Netflix's performance has been stellar. In the first quarter of 2025, revenue rose 12.5% year over year to about $10.5 billion, and earnings per share soared 25.2%. Helping the company achieve such strong earnings-per-share growth is Netflix's widening operating margin. The key profitability metric hit 31.7% in the quarter, up from 28.1% in the year-ago period. The company also reported free cash flow of $2.7 billion, up 25% year over year. Netflix's business growth has been fueled primarily by three key tailwinds: membership growth, price increases, and a fast-growing advertising business. Importantly, the company believes all three of these catalysts have room to run. In its first-quarter update, management reaffirmed its guidance for full-year revenue to increase 11.5% to 14.1% year over year. This growth, management explained, "assumes healthy member growth, higher subscription pricing and a rough doubling of our ad revenue ... " Additionally, management continues to forecast a full-year operating margin of 29%, up substantially from 26.7% in 2024. Netflix hasn't split its shares since 2015. Back then, a 7-for-1 split lowered the stock price from about $700 to $100. Today, the share price is nearly double its pre-split peak. That alone doesn't guarantee a stock split. But historically, splits are more likely when a stock becomes expensive (in terms of the share price) relative to other megacaps and the company is on solid footing. Netflix checks both boxes. There's a sense of déjà vu with Netflix today. Just as has been the case recently for the company, it was experiencing strong subscriber growth, record earnings, and benefiting from strategic catalysts the last time it split its stock. Also strengthening the case for a stock split, Netflix shares currently trade far higher than other tech leaders like Microsoft, Meta Platforms, Apple, and Nvidia. Of course, a stock split would not affect the company's fundamentals, but it would lower the price per share and make Netflix more accessible to retail investors. But it's worth emphasizing that a stock split, in and of itself, isn't a reason to buy a stock. It is, however, often a symptom of strong underlying business momentum -- momentum strong enough to cause investors to bid up the share price to a level worthy of a stock split. It's also worth noting that even though Netflix's business is doing extraordinarily well, investors seem to already be pricing in this momentum. Shares trade at 59 times earnings. All else equal, this valuation multiple will likely come down meaningfully if the company delivers on its revenue growth and operating margin expansion targets for the full year. A combination of double-digit revenue growth and margin expansion should help earnings per share grow dramatically. But with a price-to-earnings multiple well in excess of even fast-growing tech giant Nvidia's, investors seem to be already betting on more staggering growth from the streaming giant. With a surging stock price, impressive revenue growth, and a nascent and fast-growing advertising business, Netflix is a top contender for the next big tech stock split. Though the company hasn't announced plans to split its shares, it's starting to look overdue. Before you buy stock in Netflix, consider this: The Motley Fool Stock Advisor analyst team just identified what they believe are the for investors to buy now… and Netflix wasn't one of them. The 10 stocks that made the cut could produce monster returns in the coming years. Consider when Netflix made this list on December 17, 2004... if you invested $1,000 at the time of our recommendation, you'd have $674,395!* Or when Nvidia made this list on April 15, 2005... if you invested $1,000 at the time of our recommendation, you'd have $858,011!* Now, it's worth noting Stock Advisor's total average return is 997% — a market-crushing outperformance compared to 172% for the S&P 500. Don't miss out on the latest top 10 list, available when you join . See the 10 stocks » *Stock Advisor returns as of June 2, 2025 Randi Zuckerberg, a former director of market development and spokeswoman for Facebook and sister to Meta Platforms CEO Mark Zuckerberg, is a member of The Motley Fool's board of directors. Daniel Sparks and his clients have no position in any of the stocks mentioned. The Motley Fool has positions in and recommends Apple, Meta Platforms, Microsoft, Netflix, and Nvidia. The Motley Fool recommends the following options: long January 2026 $395 calls on Microsoft and short January 2026 $405 calls on Microsoft. The Motley Fool has a disclosure policy. 1 Megacap Tech Stock That Could Split Its Shares Next was originally published by The Motley Fool Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data
Yahoo
37 minutes ago
- Yahoo
A look back: Mayor Patrick Cannon's path from scandal to second chances
Stories by Charlotte Observer journalists, with AI summarization Patrick Cannon's journey from disgrace to redemption stands out in Charlotte's political history. After his 2014 conviction for taking bribes from undercover FBI agents and serving time in federal prison, Cannon acknowledged his wrongdoing on his radio show, "At the Table with Cannon." He used this platform to publicly apologize and reconnect with the community. Cannon's return to public life included advising aspiring politicians at forums and voicing support for colleagues' campaigns. Ultimately, he filed to run for City Council, telling voters he takes responsibility for his actions and wants a second chance to serve Charlotte. His campaign raises questions about trust, forgiveness, and the challenges of earning redemption in public service. On Wednesday, Patrick Cannon is scheduled to become a free man. | Published January 24, 2017 | Read Full Story Former Charlotte Mayor Patrick Cannon has a new talk-show job. | Published April 12, 2017 | Read Full Story Former Charlotte mayor Patrick Cannon apologized profusely on his new radio show for taking the bribes that sent him to federal 50, was arrested in March 2014, four months into his term, and later pleaded guilty to taking about $50,000 in bribes from federal undercover officers. | Published April 17, 2017 | Read Full Story Former Charlotte Mayor Patrick Cannon, in his first public appearance since being released from federal prison on corruption charges, said Saturday he is focused on being the 'best father, husband and son he can be' – but didn't rule out running for office again.'Anything else is God's will,' Cannon a Democrat, was part of a forum held by the Black Political Caucus for people considering running for public office. | Published May 13, 2017 | Read Full Story Needing a voice over for a campaign radio ad, at-large City Council member Claire Fallon turned to an old colleague: | Published September 14, 2017 | Read Full Story by Steve Harrison When he was convicted, a judge foretold Patrick Cannon's name ought to 'fade into our distant memories' — but this election season may change that. | Published March 4, 2022 | Read Full Story by Will Wright The former mayor is returning to Charlotte politics with a bid for City Council. | Published March 4, 2022 | Read Full Story by Anna Douglas The disgraced former mayor is hoping to make a political comeback. | Editorial | Published March 14, 2022 | Read Full Story by the Editorial Board Patrick Cannon's comments came during a forum with other candidates running for City Council. | Published April 2, 2022 | Read Full Story by Will Wright Find out who's on the ballot and what they stand for. This Q&A is one in a series for The Charlotte Observer's voter guide to 2022 local, county and state elections. | Published April 22, 2022 | Read Full Story The summary above was drafted with the help of AI tools and edited by journalists in our News division. All stories listed were reported, written and edited by McClatchy journalists.
Yahoo
37 minutes ago
- Yahoo
Scammers targeting NYC parking meters: How to protect your money
The Brief Scammers are placing fraudulent QR code stickers on NYC parking meters, leading drivers to phishing websites to steal payment information. The Department of Transportation acted swiftly by notifying users, inspecting meters, and working with Microsoft to remove the phishing site. Cybersecurity expert Robert Siciliano advises using official apps for parking payments and monitoring credit card statements, while reporting any suspicious QR codes. NEW YORK - Drivers beware! Scammers are targeting New York City parking meters by placing fraudulent QR code stickers on machines, directing drivers to third-party websites to steal payment information. What we know The Department of Transportation warns that scanning these QR codes leads to a phishing site where users are asked for payment details, which are then stolen by scammers. At least one fake sticker was found on a meter, prompting immediate action from the agency, including notifications to users, inspections of all meters, and collaboration with Microsoft to remove the phishing site. What they're saying Cybersecurity expert Robert Siciliano advises vigilance, noting that lone QR codes are often fraudulent. "A lone QR code that is plastered on is usually going to be fraud," he said. "Most municipalities and cities know at this point that there are three to five different apps that consumers might use to log in to pay for their parking, and as long as you have that app on your phone, generally you should be good." He also emphasizes monitoring credit card statements for unauthorized charges. "The problem with this particular crime is if you are not paying attention to your credit card statements in real time and pay the bill, you are responsible for that fraud," he said. What you can do The official way to pay for metered parking in the city is through the ParkNYC app or by inserting a credit card directly into the meter. Reporting any suspicious QR codes is crucial. The Source This article uses information from the New York City DOT and cybersecurity expert Robert Siciliano.