Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

The new administration’s cyber strategy: A shifting landscape for enterprise security

The cybersecurity sector entered the year facing three converging factors, creating a “perfect storm” that challenges our national cybersecurity. The first element, cybercrime, continues to spread at unprecedented speed: 2025 opened with a 44% year-over-year surge in cyberattacks, with the cost of cybercrime projected to reach $10.5 trillion by 2029. AI is the second element, exponentially improving attackers’ ability to impersonate, reduce costs and evade detection. The third — and probably the least expected — is the recent shifts in cybersecurity leadership and policy, eliminating many aspects of our existing cybersecurity programs and personnel.

Our modern economy depends on interconnected networks spanning global supply chains, military and critical infrastructure, the power grid, healthcare and election systems and financial institutions. When these systems are disrupted, the impact can debilitate national security, economic stability, public health and safety. The weakening of one link threatens the stability and security of the entire system. The interconnective nature of these distributed platforms demands a transparent and predictable set of rules and protections to ensure a stable and secure ecosystem.

It wasn’t supposed to be this way 

The first Trump administration implemented and supported robust cybersecurity efforts, leading to expectations of a stronger, not weaker, set of policies and programs. Much to the surprise of the security community, the fiscal 2026 budget proposal reduces CISA funding by $135 million. While budget fluctuations are not new, including larger cuts proposed during a prior administration, the cybersecurity community has expressed concern over the timing of this reduction amid escalating threats. This follows executive orders that have revoked Biden-era AI safety policies and disbanded the Cyber Safety Review Board (CSRB), while modifying other cybersecurity initiatives. Putting aside the merits of reform or evolving our security stance, it is the suddenness and lack of coordination that create uncertainty and potential gaps in our security stance. 

The overall impact appears to be a consensus on the degradation in CISA’s operational capacity precisely when cyber threats are increasing in frequency and sophistication. This tension between securing critical infrastructure and funding the agencies responsible for that security seems counterintuitive. 

A break in our national cyber strategy and personnel continuity is an invitation for adversaries to deploy AI tools to map our critical infrastructure vulnerabilities, disrupt global elections, erode civic trust and accelerate zero-day exploit development.

Building upon a strong foundation 

The current cyber infrastructure didn’t emerge overnight, and maintaining it demands equal parts agility and discipline. President Trump’s Executive Order 13800 in 2017 was a watershed moment in cybersecurity governance, elevating cybersecurity to a strategic priority for enterprises and federal agencies and laid the groundwork for a broader cyber deterrence strategy, shifting our posture from reactive compliance to a “defend forward” approach. The creation of CISA in 2018 codified this structure, advancing the mission to protect federal civilian agencies’ networks and bolster critical infrastructure security by creating a dedicated civilian cybersecurity agency with consolidated authority. 

Defending against cyber threats is akin to a game of whack-a-mole: when one form of intrusion is stomped out, another emerges. Take the SolarWinds cyberattack, which compromised its supply-chain platform in 2020, initiated by the Russian Foreign Intelligence Service a year earlier, and infected as many as 18,000 customers, including the US government. A year later, the ransomware attack on Colonial Pipeline resulted in a partial system shutdown and local gas shortages. Both are case studies for students of cybersecurity and demonstrate the importance, efficacy and efficiency of a coordinated response. The White hats (ethical hackers/defenders) need to share information to match the information sharing the bad operators (criminals or hostile state actors) already do. We learn from each other and can contribute in a coordinated way. Individually, we are left to fend for ourselves.

Centralized coordination and information sharing is critical. The federal government has the resources and ability to provide the framework 

Previous executive orders to improve the mechanisms used to identify and defend against threats to critical infrastructure created a formal roadmap for agencies to adopt a Zero-Trust stance, strengthened verification protocols to bolster software supply chain security, and implemented enhanced security requirements for government vendors. These previous measures included AI safety and security measures (since rescinded), and restricted the transfer and access of sensitive personal and government-related data by entities linked to designated “countries of concern.” 

The Cyber Safety Review Board, established in 2022 (now dissolved), brought unprecedented transparency to cybersecurity incident analysis. Their examinations of incidents like SolarWinds and Lapsus$ attacks provided insights that have fundamentally changed how those of us in the enterprise security space approach cyber resilience on a national scale.

Current threat landscape makes a well-funded, national Response critically important

Malicious activity by nation-state actors paints a stark picture of the vulnerability of our software supply chains, and highlights the increasing asymmetry and sophistication of state-sponsored tactics. China-sponsored activity, alone, surged 150% last year, according to CrowdStrike’s 2025 Global Threat report. Recent examples of cyber attacks on our business operations demonstrate the complexity of threats against our cyber defenses:

  • In July, China-linked hackers targeted Microsoft’s SharePoint servers and the impact was broad. More than 400 organizations, including small and enterprise businesses, some 60 government agencies and universities across the US, Europe, the Middle East and Asia, have been exposed. According to Bloomberg, the National Nuclear Security Administration, which is responsible for maintaining our nation’s cache of nuclear weapons, was also hit.
  • Cybersecurity risk to defense contractors, notably those “possessing holdings or relationships with Israeli research and defense firms,” by Iran or its affiliates received a CISA warning after the US military strikes in Iran on June 21.
  • Salt Typhoon, a China-sponsored cyberespionage campaign that infiltrated government networks and at least nine US telecommunications companies, but CSRB’s investigation into this incident was disrupted with its disbandment in January. The Salt attack followed Volt Typhoon, which targeted operational technology across critical infrastructure sectors, demonstrating how adversaries can maintain persistent access to systems for years without detection.
  • MOVEit saw a new spike in scanning activity targeting its high-value file transfer software used to share data between businesses and government agencies. The recent activity followed similar attacks on its systems in 2023, affecting more than 2,700 organizations, including the Justice Department and the Pentagon.
  • 3CX breach by North Korean actors unleashed malware across the software-based phone company’s global customers’ operating systems in 2023.
  • Ongoing threats against our federal agencies continue to be detected by CISA.

The AI acceleration problem 

AI-assisted attackers can automate reconnaissance, vulnerability scanning and lateral movement at machine speed. The time it takes for a malicious threat to move across a network is faster than ever. The average breakout time fell to 48 minutes, with the fastest dropping to just 51 seconds, according to CrowdStrike’s report. 

Our company has noted that more than 80% of phishing attacks now show some use of AI. Adding gasoline to the fire, AI-based spoofing has increased the profitability of these attacks by 50x, and are achieving success rates that outperform typical phishing by 3.5x (Zhou, A., Tang, Y., et al. (2024). “The Growing Threat of AI-Generated Phishing Emails.”). An accelerating “arms race” with AI competing with AI is afoot, and shows no signs of slowing down. 

A bright spot of note is seeing layered defenses that combine AI-powered threat detection with zero-trust authentication standards provide a strong antidote to attacks. All of this points to the truism: “A layered defense is the best approach” — just ensure that the layers are highly diverse to ensure weaknesses in one layer are covered by strengths in the other.

CISA is already defending against AI-powered cyberattacks, AI-generated misinformation and malicious AI use in critical infrastructure disruption. Substantially reducing CISA is akin to shutting down air traffic control during turbulent weather, with aircraft flying without centralized coordination to prevent collisions or learn about hidden obstacles in the flight path.

Continuity vs disruption

Since 2018, CISA has served as America’s cyber defense quarterback, protecting not just federal networks but the entire business ecosystem that businesses rely on daily. While not every breach can be prevented, the agency has been instrumental in helping enterprises integrate risk management practices and close the vulnerability gap that cybercriminals seek to exploit.

Since its creation, CISA has shown just how effective a well-funded and staffed national organization that interacts with the private sector can be:

  • Improved cyber hygiene across federal agencies with faster patches, more data to feed baseline systems more consistently.
  • Faster, coordinated incident response during cases like SolarWinds, Microsoft Exchange and Log4j.
  • Coordinated cross-government and cross-industry responses and immediate guidance to federal and private sector entities.
  • Sector-specific guidance ensuring essential services remain operational during cyber incidents. 

With more than 35 million enterprises operating across the US, disrupting the established framework could fracture federal response, enable more SolarWinds-style compromises and reduce the speed and unity of action. It sends a signal of a national deprioritization of cybersecurity at precisely the wrong moment. 

The simultaneous increase in AI investment presents a contradiction: we’re recognizing the need for enhanced AI security measures while reducing funding for the primary agency coordinating national cybersecurity efforts. This disconnect between threat recognition and resource allocation creates unnecessary risks for both government and private sector organizations. 

In recent months, we have seen the disbandment of top cybersecurity leaders at the National Security Agency, US Cyber Command and the Cyber Safety Review Board. The loss of institutional knowledge and established relationships with private sector partners takes years to rebuild. What follows is unknown, creating deep uncertainty across the cybersecurity community. This strategic shift threatens to destabilize established security frameworks when coordination is needed most.

Core principles for enterprise resilience

In the face of potential disruption, the next stage of enterprise cybersecurity must be designed for resilience. Immediate actions business leaders can take:

  • Layer your approach to security: No single layer or vendor can protect us from all attacks. Each has its strengths and blind spots. Create a diverse and layered security posture.
  • Pair zero trust authentication with active AI-based solutions: Zero trust authentication pairs well with AI-based defenses. They each bring different strengths to the table.
  • Strengthen incident response: In addition to regular tabletop exercises and clear escalation procedures, join groups or organizations that are willing to share expertise and intel “we are stronger together.”
  • Invest in threat hunting: Develop internal analysis capabilities, including strategic threat assessment that can evaluate adversary motivations and predict future attack vectors.
  • Secure supply chains: Implement rigorous vendor risk assessments, maintain software component inventories and establish rapid response protocols for supply chain compromises. 

A defining moment 

The cybersecurity landscape will continue to evolve at an accelerated pace, driven by AI advancement, sophisticated adversaries and geopolitical tensions. This is a defining moment: we can build on the lessons and cybersecurity progress we’ve achieved — or we can undermine national resilience by unwinding the frameworks meant to protect us in an AI-powered world. Change and evolution of the frameworks can lead to more secure systems — if done in partnership and by leveraging our collective knowledge. 

Reverting to fragmented systems and a loss of expert personnel will create dangerous security gaps across the landscape. This moment must be met with open dialogue, transparency and in partnership with the public/private sector. Coordinated, consistent and unified action from both industry and policy leaders is needed to prepare for the challenges ahead.

This article is published as part of the Foundry Expert Contributor Network.
Want to join?


Read More from This Article: The new administration’s cyber strategy: A shifting landscape for enterprise security
Source: News

Category: NewsAugust 18, 2025
Tags: art

Post navigation

PreviousPrevious post:生成AIの使い方はみんな一緒ではない!? 最新研究から考えるプロダクト設計NextNext post:Así es LexIA, el agente de IA con el que Prosegur procesará 50.000 contratos

Related posts

AI, power and the trade-off between freedom and innovation
May 14, 2026
Building an AI CoE: Why you need one and how to make it work
May 14, 2026
AI-driven layoffs aren’t making business sense
May 14, 2026
How deepfakes are rewriting the rules of the modern workplace
May 14, 2026
CIOs are put to the test as security regulations across borders recalibrate
May 14, 2026
Decision-making speed is a hidden constraint on transformation success
May 14, 2026
Recent Posts
  • AI, power and the trade-off between freedom and innovation
  • Building an AI CoE: Why you need one and how to make it work
  • AI-driven layoffs aren’t making business sense
  • CIOs are put to the test as security regulations across borders recalibrate
  • How deepfakes are rewriting the rules of the modern workplace
Recent Comments
    Archives
    • May 2026
    • April 2026
    • March 2026
    • February 2026
    • January 2026
    • December 2025
    • November 2025
    • October 2025
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.