www.cybersecuritydive.com Open in urlscan Pro
2606:4700:4400::ac40:93a0  Public Scan

Submitted URL: https://link.cybersecuritydive.com/click/37753256.8986/aHR0cHM6Ly93d3cuY3liZXJzZWN1cml0eWRpdmUuY29tL25ld3MvZmNjLWN5YmVyLXJ1bGVzLXNh...
Effective URL: https://www.cybersecuritydive.com/news/fcc-cyber-rules-salt-typhoon/734867/?utm_source=Sailthru&utm_medium=email&utm_campaign=Issu...
Submission: On December 30 via api from AE — Scanned from DE

Form analysis 7 forms found in the DOM

Name: signup-inter-formPOST /signup/

<form id="signup-inter-form" class="form-basic" name="signup-inter-form" action="/signup/" method="POST">
  <input type="hidden" name="signup_box_location" value="interstitial">
  <input type="hidden" name="signup_initial_url_path" value="">
  <h1> Don’t miss tomorrow’s Cybersecurity industry news </h1>
  <p class="interstitial-text"> Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox. </p>
  <p class="form-error__message" id="interstitial-error"></p>
  <div id="form-interstitial">
    <input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_37ad90_email">
    <div id="newsletter-list-section">
    </div>
    <div id="interstitial-consent-container">
      <input name="user_consent" value="1" id="id_user_consent" type="checkbox">
      <span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and <a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>.
        You can unsubscribe at anytime. </span>
    </div>
  </div>
  <input id="signup-inter-submit" class="email_submit submit button" type="submit" data-role="none" value="Subscribe today">
</form>

GET /search/

<form action="/search/" method="GET" data-ajax="false">
  <label for="search-desktop">
    <span class="screen-reader-text search">Search</span>
  </label>
  <input id="search-desktop" type="search" name="q" placeholder="Search" data-role="none">
  <button type="submit" value="" data-role="none" class="search-button-front analytics t-search-navigation-drawer">
    <img src="/static/img/menu_icons/search.svg?320116291121" alt="search" height="16" width="16" loading="lazy">
  </button>
  <img class="close" src="/static/img/menu_icons/close.svg?273117231121" width="16" height="16" alt="close search" loading="lazy">
</form>

Name: signupPOST /signup/

<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
  <label for="id_7b224a_email" class="email-input js-email-input">
    <span class="screen-reader-text">Email:</span>
    <input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_7b224a_email">
  </label>
  <input type="hidden" name="signup_box_location" value="elevated_footer">
  <input type="hidden" name="signup_initial_url_path" value="/news/fcc-cyber-rules-salt-typhoon/734867/">
  <input type="hidden" name="js_enabled" value="1" id="id_7b224a_js_enabled">
  <ul class="signup-list list-no-bullets">
    <li>
      <label><span class="screen-reader-text">Select user consent:</span></label>
      <input type="checkbox" name="user_consent" id="id_user_consent-elevated_footer" value="1" class="checkbox">
      <label for="id_user_consent-elevated_footer">
        <span class="signup-user-consent_box">
          <span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and
            <a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
        </span>
      </label>
    </li>
  </ul>
  <button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
  <script type="module" src="/static/js/dist/sendEmailToLytics.bundle.js?450616181224"></script>
  <label class="error email_error" style="display:none;">A valid email address is required.</label>
  <label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>

Name: signupPOST /signup/

<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
  <label for="id_1cfa99_email" class="email-input js-email-input">
    <span class="screen-reader-text">Email:</span>
    <input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_1cfa99_email">
  </label>
  <input type="hidden" name="signup_box_location" value="sidebar">
  <input type="hidden" name="signup_initial_url_path" value="/news/fcc-cyber-rules-salt-typhoon/734867/">
  <input type="hidden" name="js_enabled" value="1" id="id_1cfa99_js_enabled">
  <ul class="signup-list list-no-bullets">
    <li>
      <label><span class="screen-reader-text">Select user consent:</span></label>
      <input type="checkbox" name="user_consent" id="id_user_consent-sidebar" value="1" class="checkbox">
      <label for="id_user_consent-sidebar">
        <span class="signup-user-consent_box">
          <span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and
            <a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
        </span>
      </label>
    </li>
  </ul>
  <button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
  <script type="module" src="/static/js/dist/sendEmailToLytics.bundle.js?450616181224"></script>
  <label class="error email_error" style="display:none;">A valid email address is required.</label>
  <label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>

Name: signupPOST /signup/

<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
  <label for="id_1ea57b_email" class="email-input js-email-input">
    <span class="screen-reader-text">Email:</span>
    <input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_1ea57b_email">
  </label>
  <input type="hidden" name="signup_box_location" value="elevated_footer">
  <input type="hidden" name="signup_initial_url_path" value="/news/fcc-cyber-rules-salt-typhoon/734867/">
  <input type="hidden" name="js_enabled" value="1" id="id_1ea57b_js_enabled">
  <ul class="signup-list list-no-bullets">
    <li>
      <label><span class="screen-reader-text">Select user consent:</span></label>
      <input type="checkbox" name="user_consent" id="id_user_consent-elevated_footer" value="1" class="checkbox">
      <label for="id_user_consent-elevated_footer">
        <span class="signup-user-consent_box">
          <span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and
            <a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
        </span>
      </label>
    </li>
  </ul>
  <button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
  <script type="module" src="/static/js/dist/sendEmailToLytics.bundle.js?450616181224"></script>
  <label class="error email_error" style="display:none;">A valid email address is required.</label>
  <label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>

GET /search/

<form action="/search/" method="GET" data-ajax="false">
  <label for="search-mobile">
    <span class="screen-reader-text">Search</span>
    <input id="search-mobile" type="search" name="q" placeholder="Search" data-role="none">
  </label>
  <button type="submit" value="" data-role="none" class="search-button-front analytics t-search-navigation-mobile">
    <img src="/static/img/menu_icons/search.svg?320116291121" width="15" height="15" alt="search">
  </button>
</form>

Name: signupPOST /signup/

<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
  <label for="id_f86064_email" class="email-input js-email-input">
    <span class="screen-reader-text">Email:</span>
    <input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_f86064_email">
  </label>
  <input type="hidden" name="signup_box_location" value="integrated_menu">
  <input type="hidden" name="signup_initial_url_path" value="/news/fcc-cyber-rules-salt-typhoon/734867/">
  <input type="hidden" name="js_enabled" value="1" id="id_f86064_js_enabled">
  <ul class="signup-list list-no-bullets">
    <li>
      <label><span class="screen-reader-text">Select user consent:</span></label>
      <input type="checkbox" name="user_consent" id="id_user_consent-integrated_menu" value="1" class="checkbox">
      <label for="id_user_consent-integrated_menu">
        <span class="signup-user-consent_box">
          <span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and
            <a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
        </span>
      </label>
    </li>
  </ul>
  <button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
  <script type="module" src="/static/js/dist/sendEmailToLytics.bundle.js?450616181224"></script>
  <label class="error email_error" style="display:none;">A valid email address is required.</label>
  <label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>

Text Content

Skip to main content

CONTINUE TO SITE ➞



DON’T MISS TOMORROW’S CYBERSECURITY INDUSTRY NEWS

Let Cybersecurity Dive’s free newsletter keep you informed, straight from your
inbox.



By signing up to receive our newsletter, you agree to our Terms of Use and
Privacy Policy. You can unsubscribe at anytime.

 * Deep Dive
 * Library
 * Events
 * Press Releases
 * Topics

Sign up
 * Search
 * Sign up

Search
 * Strategy
 * Breaches
 * Vulnerability
 * Cyberattacks
 * Threats
 * Leadership & Careers
 * Policy & Regulation


An article from
Dive Brief


FCC PROPOSES STRONGER TELECOM CYBER RULES AS SALT TYPHOON FALLOUT CONTINUES

The agency’s proposed rule changes come two months after a China-government
sponsored espionage campaign first came to light.

Published Dec. 6, 2024
Matt Kapko Senior Reporter
 * post
 * share
 * post
 * print
 * email
 * license


Federal Communications Commission Chair Jessica Rosenworcel testifies before the
House Energy and Commerce Committee’s Communications and Technology Subcommittee
on Dec. 5, 2019, in Washington, D.C. Rosenworcel proposed rules changes to
bolster telecom operators defenses on Dec. 5, 2024. Chip Somodevilla/Getty
Images via Getty Images


DIVE BRIEF:

 * Federal Communications Commission Chair Jessica Rosenworcel on Thursday
   proposed stronger rules requiring telecom operators to secure their networks
   from intrusions, in response to the wave of China-linked attacks on U.S.
   carriers’ infrastructure.
 * The measure has two parts. Rosenworcel proposed a declaratory ruling to
   clarify telecom operators are legally obligated to secure their networks
   under Section 105 of the Communications Assistance for Law Enforcement Act.
   The second lever, a notice of proposed rulemaking, includes an annual
   certification requirement for telecom providers to maintain cybersecurity
   risk management plans.
 * “While the commission’s counterparts in the intelligence community are
   determining the scope and impact of the Salt Typhoon attack, we need to put
   in place a modern framework to help companies secure their networks and
   better prevent and respond to cyberattacks in the future,” Rosenworcel said
   in a statement Thursday.





DIVE INSIGHT:

The FCC’s proposals come two months after news first broke about an espionage
campaign sponsored by China’s government that federal officials scrambled to
assess and have yet to contain.

“Given the magnitude of this global attack, it’s clear that we were caught off
guard, need to catch up and then keep up,” said Stéphane Téral, founder and
chief analyst at Téral Research.

Salt Typhoon, a China-affiliated threat group, compromised at least eight U.S.
telecom providers, stole a large amount of records and still has access to the
networks, officials said earlier this week. The threat group gained broad access
to communications of everyday Americans and also stole private audio and text
content of targeted U.S. government and political officials.

The FCC did not respond to a request for comment or explain when or how soon the
declaratory ruling or proposed rule could take effect. The agency took an active
role in enforcing cybersecurity and data protection in the sector this year,
expanding cooperation with state attorneys general and instituting new data
breach reporting rules.

Zeus Kerravala, founder and principal analyst at ZK Research, said the FCC has
the right idea but he’s skeptical of its ultimate impact.

The call to “mandate they secure their networks from unlawful access is a very
broad statement, and I believe the operators do this today to the best of their
ability,” Kerravala said.

The FCC and national security agencies need to increase coordination and
collaboration, Téral said.

Industry analysts question the outcome of the FCC’s efforts, particularly in the
absence of greater support.

The agency’s efforts will deliver “little impact if insufficient resources are
deployed for implementation and execution,” Téral said. “The name of the game is
to stay ahead of all continuously evolving threats.”

 * 
 * 
 * 
 * 
 * 
 * purchase licensing rights

Filed Under: Cyberattacks, Policy & Regulation


CYBERSECURITY DIVE NEWS DELIVERED TO YOUR INBOX

Get the free daily newsletter read by industry experts

Email:
 * Select user consent: By signing up to receive our newsletter, you agree to
   our Terms of Use and Privacy Policy. You can unsubscribe at anytime.

Sign up A valid email address is required. Please select at least one
newsletter.



EDITORS’ PICKS

 * Ethan Miller via Getty Images
   Deep Dive
   
   
   AT MICROSOFT, YEARS OF SECURITY DEBT COME CRASHING DOWN
   
   Critics say negligence, misguided investments and hubris have left the
   enterprise giant on its back foot.
   
   By David Jones • April 30, 2024
 * Kevin Dietsch / Staff via Getty Images
   
   
   SUPREME COURT RULING ON CHEVRON DOCTRINE MAY UPEND FUTURE CYBERSECURITY
   REGULATION
   
   Experts expect new legal challenges against numerous agency cybersecurity
   requirements, including incident reporting mandates and rules governing
   critical infrastructure sectors.
   
   By David Jones • Updated July 8, 2024


GET THE FREE NEWSLETTER

Subscribe to Cybersecurity Dive for top news, trends & analysis

Email:
 * Select user consent: By signing up to receive our newsletter, you agree to
   our Terms of Use and Privacy Policy. You can unsubscribe at anytime.

Sign up A valid email address is required. Please select at least one
newsletter.



MOST POPULAR

 1. White House says 9th telecom company hit in Salt Typhoon spree
 2. At least 8 US companies hit in telecom attack spree, officials say
 3. CISA mobile security advice gets personal in wake of telecom intrusions
 4. Feds raise alarm on China-linked infiltration of telecom networks


LIBRARY RESOURCES

 * Webinar - on demand
   Reducing Mobile Risk: Smishing, Quishing, and Executive Impersonation Custom
   content for Lookout
 * Trendline
   The biggest cybersecurity trends to watch for 2025 Supported by Wind River
 * Trendline
   Cybersecurity in the healthcare industry Supported by Imprivata

View all


COMPANY ANNOUNCEMENTS

 * Rumpke Data Breach Investigation From Migliaccio and Rathod
 * DigiCert Releases First-of-Its-Kind Open-Source DCV Library to Elevate
   Industry Standards From DigiCert
 * Migliaccio and Rathod Investigates Byte Federal Data Breach From Migliaccio
   and Rathod
 * Only Cynet Delivers 100% Protection and 100% Detection Visibility in the 2024
   MITRE ATT&CK Eva… From Cynet Security

View all | Post a press release


EVENTS

 * 17 MAR
   Conference Enterprise Connect Orlando, Florida
   Presented by Informa Connect
 * 24 MAR
   Conference Channel Partners Conference & Expo, co-located with MSP Summit Las
   Vegas, Nevada
   Presented by Informa

Promote an event



CYBERSECURITY DIVE NEWS DELIVERED TO YOUR INBOX

Get the free daily newsletter read by industry experts

Email:
 * Select user consent: By signing up to receive our newsletter, you agree to
   our Terms of Use and Privacy Policy. You can unsubscribe at anytime.

Sign up A valid email address is required. Please select at least one
newsletter.



COMPANY ANNOUNCEMENTS

View all | Post a press release
Rumpke Data Breach Investigation
From Migliaccio and Rathod
December 11, 2024
DigiCert Releases First-of-Its-Kind Open-Source DCV Library to Elevate Industry
Standards
From DigiCert
December 18, 2024
Migliaccio and Rathod Investigates Byte Federal Data Breach
From Migliaccio and Rathod
December 12, 2024
Only Cynet Delivers 100% Protection and 100% Detection Visibility in the 2024
MITRE ATT&CK Eva…
From Cynet Security
December 11, 2024
Editors’ picks
 * Ethan Miller via Getty Images
   Deep Dive
   
   
   AT MICROSOFT, YEARS OF SECURITY DEBT COME CRASHING DOWN
   
   Critics say negligence, misguided investments and hubris have left the
   enterprise giant on its back foot.
   
   By David Jones • April 30, 2024
 * Kevin Dietsch / Staff via Getty Images
   
   
   SUPREME COURT RULING ON CHEVRON DOCTRINE MAY UPEND FUTURE CYBERSECURITY
   REGULATION
   
   Experts expect new legal challenges against numerous agency cybersecurity
   requirements, including incident reporting mandates and rules governing
   critical infrastructure sectors.
   
   By David Jones • Updated July 8, 2024

Latest in Cyberattacks
 * White House says 9th telecom company hit in Salt Typhoon spree
   By Matt Kapko
 * BeyondTrust customers hit by wave of attacks linked to compromised API key
   By Matt Kapko
 * Flagstar fined $3.5M for ‘misleading’ after 2021 cyberattack
   By Gabrielle Saulsbery
 * CISA mobile security advice gets personal in wake of telecom intrusions
   By Matt Kapko

--------------------------------------------------------------------------------

 * 
 * 
 * 
 * 

EXPLORE

 * About
 * Editorial Team
 * Contact Us
 * Newsletter
 * Purchase Licensing Rights
 * Press Releases
 * What We’re Reading

REACH OUR AUDIENCE

 * Advertising
 * Post a press release
 * Promote an event

RELATED PUBLICATIONS

 * CIO Dive

--------------------------------------------------------------------------------

Industry Dive is an Informa TechTarget business.
© 2024 TechTarget, Inc. or its subsidiaries. All rights reserved. | View our
other publications | Privacy policy | Terms of use | Take down policy.
Cookie Preferences / Do Not Sell
This website is owned and operated by Informa TechTarget, part of a global
network that informs, influences and connects the world’s technology buyers and
sellers. All copyright resides with them. Informa PLC’s registered office is 5
Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget,
Inc.’s registered office is 275 Grove St. Newton, MA 02466.
Search
 * Home
 * Topics
   * Strategy
   * Breaches
   * Vulnerability
   * Cyberattacks
   * Threats
   * Leadership & Careers
   * Policy & Regulation
 * Deep Dive
 * Library
 * Events
 * Press Releases


GET CYBERSECURITY DIVE IN YOUR INBOX

The free newsletter covering the top industry headlines

Email:
 * Select user consent: By signing up to receive our newsletter, you agree to
   our Terms of Use and Privacy Policy. You can unsubscribe at anytime.

Sign up A valid email address is required. Please select at least one
newsletter.