Connect with us

Published

on

Almost a year into the second Trump administration, public sector leaders and cybersecurity experts say budget cuts and gutting of federal agencies are weakening critical lines of government communication to help companies prepare and respond to cyberattacks, even as AI threats are rising.

The most recent assessment of cybersecurity, based on the goals set forward by the bipartisan U.S. Cyberspace Solarium Commission, found that the U.S. was slipping in its progress toward 82 goals to create a strong cyber defense. “We were surprised and disappointed,” said Ret. Admiral Mark Montgomery, the executive director of Cybersolarium.org. The goals include things like reducing complex regulations on critical infrastructure companies, adding to cyber capacity in the FBI and within intelligence agencies, and improving K-12 cybersecurity education.

Montgomery said the primary causes of the slip in cyber readiness are cuts at the Cybersecurity and Infrastructure Agency, as well as earlier DOGE efforts carving a wide swath through the State Department, the National Science Foundation, National Institute of Standards and Technology and the U.S. Department of Commerce.

Meanwhile, a law that enabled companies to share information about cybersecurity without antitrust or liability concerns lapsed on Sept. 30.

The assessment of the Cyberspace Solarium Commission, now part of the Foundation for Defense of Democracies, came despite public commitments by the Trump administration to cyber defense improvements, which the White House outlined in a June executive order framing its approach as “sustaining select efforts to strengthen the nation’s cybersecurity.” 

“Under the leadership of President Trump and Secretary Noem [Department of Homeland Security Secretary Krisit Noem], CISA is steadfastly fulfilling its core mission by demonstrating daily operational collaboration, accelerating intelligence sharing, and strengthening our defense of cybersecurity and critical infrastructure across the nation,” wrote a CISA spokeswoman in an emailed statement.

“I agree that we have more pessimistic view of government cybersecurity efforts over the past eight months, as opposed to the administration’s self assessment,” said Montgomery.

A less proactive federal government when it comes to cybersecurity is concerning based on the recent history of rising nation-state linked attacks. On Thursday, the Congressional Budget Office was targeted in a hack, reportedly by a foreign nation-state actor, according to the Washington Post.

Some cybersecurity actions are also stalled in Congress. For instance, the Trump administration’s nominee for head of CISA, Sean Plankey, has yet to be confirmed since summer hearings.  

The upshot, according to national security experts, is a federal government that is less active than it should be in cybersecurity efforts across the country.

“We’re shifting responsibility for primary coordination of cybersecurity to states and industry while simultaneously gutting the resources that would help them do that. Federal grant funding for state and local cybersecurity and critical partnerships has been slashed, while the Cybersecurity Information Sharing Act protection expired in October,” wrote Carole House, former National Security Council Special Advisor and CEO of Penumbra Strategies in a message. “We’re handing off coordination (to industry) while kicking away the ladder,” she added.

Experts are also concerned about a rule that would have made big tech companies responsible for developing safer software for businesses and consumers, which has been stripped of its enforcement mechanism. The result, according to experts’ assessments, is that Americans and the U.S. economy are less safe from cyberattacks than a year ago.

Nor are military agencies necessarily picking up the slack. “I’ve been very concerned about the top leadership at Cyber Command and the (National Security Agency) being vacant for eight months. That translates to inertia and lack of direction,” said U.S. Rep. Don Bacon, a Republican from the second district of Nebraska who is not running for re-election, in an emailed statement. “Further, this Administration has been significantly cutting the budget and personnel for CISA, which is out on the front lines to defend our private sector and infrastructure from cyberattack.” 

‘Death by a thousand papercuts’

Montgomery cited the 2023 discovery of Volt Typhoon, a cyber attacker from the People’s Republic of China that had infiltrated critical infrastructure companies such as those operating in telecoms, water, transportation and energy, as an example of what is happening while the federal government retreats. Volt Typhoon could have been “operational preparation of the battlefield,” said Montgomery. When it was discovered, CISA issued recommendations of patches and steps that private companies should take. But not all of the infiltrations have been detected; and meanwhile, there are probably new attacks happening now. But the mechanisms for sharing that information have been gutted by the administration’s cuts and the political gridlock in Washington, D.C.

“The only way you’re going to detect this is with assistance from the government,” said Montgomery. “There are tell-tale signs that can be shared.”

In the springtime, cybersecurity experts began referring to the situation as “death by a thousand papercuts.”

Because critical infrastructure in the United States is owned and managed by companies large and small across the company, the cybersecurity defense system that had evolved under the past few administrations was complex and relied on public-private partnerships. The weakening of the public sector support for cybersecurity is throwing more responsibility onto companies.

Among many other reductions, the Trump administration disbanded an entity called the CIPAC, which enabled sharing of information between the federal government and the owners of parts of critical infrastructure, ranging from water systems to finance companies to electric grid operators to hospitals. Because it was disbanded, many industrial councils, including the one that pulled companies in the defense industrial base together to share information, are not operating as they were before. Montgomery said he believed companies were exchanging information, but not as freely or in as coordinated a way. 

The responses across industries have been haphazard. For instance, the E-ISAC, a cybersecurity information sharing council for the electric industry, is operating, but others, including the elections infrastructure council, have been defunded.

“The biggest regression is not technology, it is coordination,” said Evan Reiser, CEO of Abnormal AI, who said by email that he agreed with the concern from public sector leaders. “Signals are trapped in silos across agencies and vendors. Without real-time sharing of high-quality telemetry, defenders fight blind,” he said.

AI makes retreat on cyber defense more dangerous

Meanwhile, the threat is changing and growing exponentially because of artificial intelligence, said Kaitlin Betancourt, a partner at law firm Goodwin who focuses on cybersecurity law and compliance, and AI strategy and governance. “I think the cybersecurity risks that we’re being presented with right now have gone sharply up. Any cutting back of resources is the opposite direction of where we need to be,” she said.

Cybercriminals are embedding AI throughout their operations, from victim profiling, to automated service delivery and creating false identities. In one case in late summer, generative AI company Anthropic said criminals used its Claude chatbot to attack 17 different organizations with psychologically targeted, industry-specific extortion threats ranging from $75,000 to $500,000. The company said it was able to stop the attack.

Most cyberattacks come through legacy systems, such as email and spreadsheets, used by humans who fall prey to increasingly sophisticated lures. The Biden administration put in place a new measure requiring large software companies to attest to CISA that they had secure software. Those that failed would be referred to the attorney general for enforcement.

In June, Trump issued an executive order amending Obama and Biden executive orders on cybersecurity. The Trump order kept the requirements for attestation — meaning software companies need to report and show that they developed their software in a safe fashion. But the order also removed language that encouraged the national cyber director to refer attestations that fail validation to the attorney general for action as appropriate. In February, the Justice Department had brought an enforcement action against a software company related to compliance with cybersecurity standards. 

“Trump’s order retains an emphasis on software supply chain cybersecurity. It retains much of the Biden administration’s framework but scales back prescriptive directives and enforcement mechanisms, particularly those related to secure software development “attestations,” Betancourt and her colleagues wrote.

Cybercriminals generally aim to steal data or shut down systems in extortion schemes. In some cases, they are simply criminals; in other cases, the criminals are affiliated with nation-states, such as China, North Korea or Iran, whose missions are to damage the U.S. or fund their own operations. For instance, in February, hackers sponsored by North Korea stole approximately $1.5 billion in ethereum from the Binance cryptocurrency exchange, which has no official headquarters. Officials suspect the money will be laundered and used for the North Korean missile program.

In other cases, the attackers, especially those affiliated with geopolitical foes, may simply be undermining the economy of the United States without triggering a conventional war. And, of course, in the cat-and-mouse game, the United States can be waging its own instructions and cyberattacks on other countries’ systems. Officials from the Trump administration have spoken publicly about beefing up offensive capabilities, though it’s not clear how. Meanwhile, experts say both offense and defense are necessary – with the latter relying heavily on the private sector to spend in an informed way to protect their systems.

“I think we can recover from this,” Montgomery said. “But you can’t continue to cut.”

Continue Reading

Technology

Week in review: The Nasdaq’s worst week since April, three trades, and earnings

Published

on

By

Week in review: The Nasdaq's worst week since April, three trades, and earnings

Continue Reading

Technology

Too early to bet against AI trade, State Street suggests 

Published

on

By

Too early to bet against AI trade, State Street suggests 

Momentum and private assets: The trends driving ETFs to record inflows

State Street is reiterating its bullish stance on the artificial intelligence trade despite the Nasdaq’s worst week since April.

Chief Business Officer Anna Paglia said momentum stocks still have legs because investors are reluctant to step away from the growth story that’s driven gains all year.

“How would you not want to participate in the growth of AI technology? Everybody has been waiting for the cycle to change from growth to value. I don’t think it’s happening just yet because of the momentum,” Paglia told CNBC’s “ETF Edge” earlier this week. “I don’t think the rebalancing trade is going to happen until we see a signal from the market indicating a slowdown in these big trends.”

Paglia, who has spent 25 years in the exchange-traded funds industry, sees a higher likelihood that the space will cool off early next year.

“There will be much more focus about the diversification,” she said.

Her firm manages several ETFs with exposure to the technology sector, including the SPDR NYSE Technology ETF, which has gained 38% so far this year as of Friday’s close.

The fund, however, pulled back more than 4% over the past week as investors took profits in AI-linked names. The fund’s second top holding as of Friday’s close is Palantir Technologies, according to State Street’s website. Its stock tumbled more than 11% this week after the company’s earnings report on Monday.

Despite the decline, Paglia reaffirmed her bullish tech view in a statement to CNBC later in the week.

Meanwhile, Todd Rosenbluth suggests a rotation is already starting to grip the market. He points to a renewed appetite for health-care stocks.

“The Health Care Select Sector SPDR Fund… which has been out of favor for much of the year, started a return to favor in October,” the firm’s head of research said in the same interview. “Health care tends to be a more defensive sector, so we’re watching to see if people continue to gravitate towards that as a way of diversifying away from some of those sectors like technology.”

The Health Care Select Sector SPDR Fund, which has been underperforming technology sector this year, is up 5% since Oct. 1. It was also the second-best performing S&P 500 group this week.

Disclaimer

Continue Reading

Technology

People with ADHD, autism, dyslexia say AI agents are helping them succeed at work

Published

on

By

People with ADHD, autism, dyslexia say AI agents are helping them succeed at work

Neurodiverse professionals may see unique benefits from artificial intelligence tools and agents, research suggests. With AI agent creation booming in 2025, people with conditions like ADHD, autism, dyslexia and more report a more level playing field in the workplace thanks to generative AI.

A recent study from the UK’s Department for Business and Trade found that neurodiverse workers were 25% more satisfied with AI assistants and were more likely to recommend the tool than neurotypical respondents.

“Standing up and walking around during a meeting means that I’m not taking notes, but now AI can come in and synthesize the entire meeting into a transcript and pick out the top-level themes,” said Tara DeZao, senior director of product marketing at enterprise low-code platform provider Pega. DeZao, who was diagnosed with ADHD as an adult, has combination-type ADHD, which includes both inattentive symptoms (time management and executive function issues) and hyperactive symptoms (increased movement).

“I’ve white-knuckled my way through the business world,” DeZao said. “But these tools help so much.”

AI tools in the workplace run the gamut and can have hyper-specific use cases, but solutions like note takers, schedule assistants and in-house communication support are common. Generative AI happens to be particularly adept at skills like communication, time management and executive functioning, creating a built-in benefit for neurodiverse workers who’ve previously had to find ways to fit in among a work culture not built with them in mind.

Because of the skills that neurodiverse individuals can bring to the workplace — hyperfocus, creativity, empathy and niche expertise, just to name a few — some research suggests that organizations prioritizing inclusivity in this space generate nearly one-fifth higher revenue.

AI ethics and neurodiverse workers

“Investing in ethical guardrails, like those that protect and aid neurodivergent workers, is not just the right thing to do,” said Kristi Boyd, an AI specialist with the SAS data ethics practice. “It’s a smart way to make good on your organization’s AI investments.”

Boyd referred to an SAS study which found that companies investing the most in AI governance and guardrails were 1.6 times more likely to see at least double ROI on their AI investments. But Boyd highlighted three risks that companies should be aware of when implementing AI tools with neurodiverse and other individuals in mind: competing needs, unconscious bias and inappropriate disclosure.

“Different neurodiverse conditions may have conflicting needs,” Boyd said. For example, while people with dyslexia may benefit from document readers, people with bipolar disorder or other mental health neurodivergences may benefit from AI-supported scheduling to make the most of productive periods. “By acknowledging these tensions upfront, organizations can create layered accommodations or offer choice-based frameworks that balance competing needs while promoting equity and inclusion,” she explained.

Regarding AI’s unconscious biases, algorithms can (and have been) unintentionally taught to associate neurodivergence with danger, disease or negativity, as outlined in Duke University research. And even today, neurodiversity can still be met with workplace discrimination, making it important for companies to provide safe ways to use these tools without having to unwillingly publicize any individual worker diagnosis.

‘Like somebody turned on the light’

As businesses take accountability for the impact of AI tools in the workplace, Boyd says it’s important to remember to include diverse voices at all stages, implement regular audits and establish safe ways for employees to anonymously report issues.

The work to make AI deployment more equitable, including for neurodivergent people, is just getting started. The nonprofit Humane Intelligence, which focuses on deploying AI for social good, released in early October its Bias Bounty Challenge, where participants can identify biases with the goal of building “more inclusive communication platforms — especially for users with cognitive differences, sensory sensitivities or alternative communication styles.”

For example, emotion AI (when AI identifies human emotions) can help people with difficulty identifying emotions make sense of their meeting partners on video conferencing platforms like Zoom. Still, this technology requires careful attention to bias by ensuring AI agents recognize diverse communication patterns fairly and accurately, rather than embedding harmful assumptions.

DeZao said her ADHD diagnosis felt like “somebody turned on the light in a very, very dark room.”

“One of the most difficult pieces of our hyper-connected, fast world is that we’re all expected to multitask. With my form of ADHD, it’s almost impossible to multitask,” she said.

DeZao says one of AI’s most helpful features is its ability to receive instructions and do its work while the human employee can remain focused on the task at hand. “If I’m working on something and then a new request comes in over Slack or Teams, it just completely knocks me off my thought process,” she said. “Being able to take that request and then outsource it real quick and have it worked on while I continue to work [on my original task] has been a godsend.”

Continue Reading

Trending