By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Cyberattacks are hurting US businesses. Here’s how Congress can upgrade cybersecurity information sharing.
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Cyberattacks are hurting US businesses. Here’s how Congress can upgrade cybersecurity information sharing.
News

Cyberattacks are hurting US businesses. Here’s how Congress can upgrade cybersecurity information sharing.

News Room
Last updated: 2025/06/07 at 2:39 AM
News Room Published 7 June 2025
Share
SHARE

New Atlanticist

June 5, 2025 • 10:11 am ET


Cyberattacks are hurting US businesses. Here’s how Congress can upgrade cybersecurity information sharing.

By
Tanner Wilburn, Sara Ann Brackett, and Urmita Chowdhury

Cybersecurity is a team sport, yet small and medium-sized businesses (SMBs) have spent years on the sidelines, despite being the targets of an estimated 43 percent of cyberattacks in the United States. As Congress discusses renewing the United States’ cybersecurity information-sharing framework, it’s time to finally welcome SMBs into the cybersecurity community. 

On September 30, the framework for sharing important cybersecurity information between government and industry, the Cybersecurity Information Sharing Act of 2015 (CISA 2015), will expire unless Congress acts. This law—distinct from the similarly named Cybersecurity and Infrastructure Security Agency (also CISA)—provides essential legal protections that allow private companies to share cyber threat information among themselves and with the government.

There is already bipartisan support for renewing CISA 2015. Senators Gary Peters (D-MI) and Mike Rounds (R-SD) introduced legislation to extend the current law for another ten years without changes, an approach supported by major trade associations. The bill’s authors correctly emphasize the importance of preserving the established information-sharing environment. Yet, renewing CISA 2015 unchanged leaves the cybersecurity community blind to critical threat intelligence that SMBs uniquely hold.

As originally passed, CISA 2015 removed legal barriers and disincentives to sharing cyber threat data. It provides liability protections and exemptions from certain public disclosure requirements or regulatory penalties for companies that share threat indicators in good faith. These protections significantly reduce the risk of lawsuits or regulatory enforcement when organizations exchange information with the Department of Homeland Security (DHS) or other companies under the framework, provided the information was anonymized and used strictly for a “cybersecurity purpose.”

These protections dramatically enhanced cybersecurity information sharing. In the private sector, entities such as the Cyber Threat Alliance formed to facilitate voluntary company-to-company information sharing. Information Sharing and Analysis Centers (ISACs), organizations dedicated to collecting, analyzing, and disseminating sector-specific threat data, have also grown substantially. The National Council of ISACs now comprises twenty-seven sector-specific ISACs, while the Multi-State ISAC alone exceeded 18,000 members last year. These members share cyber threat information directly because of the protections offered by CISA 2015. Even government programs have evolved in response. DHS’s Automated Indicator Sharing (AIS) platform has significantly improved rapid information exchanges and threat awareness, aided by CISA 2015 protections.

SMBs are being left behind

Still missing from this list, however, are the large number of SMBs that operate across the United States. SMBs have largely been overlooked, are subject to a large number of attacks, and their employees face social engineering threats such as phishing and fraud 350 percent more than those at large companies. While platforms such as DHS’s AIS are beneficial to larger corporations, SMB participation remains limited due to high costs, technical complexity, and inadequate outreach. This exclusion leaves SMBs vulnerable and deprives the cybersecurity community of a significant source of threat intelligence.

Since 2015, the cyber threat landscape has evolved, with SMBs now frequent targets. Roughly one in three small businesses will suffer a cyberattack in the next year, with each incident costing an average of nearly $255,000, almost an order of magnitude greater than the 2014 average cost of $27,752. This changed threat landscape and lack of participation in information sharing leaves a gap. 

Any new CISA 2015 authorization should address this gap to benefit the entire cybersecurity ecosystem. SMBs represent a valuable source of threat data, and integrating their insights would significantly enhance predictive capabilities and resilience. Strengthening SMB defenses would also reduce opportunities for attackers to exploit smaller entities as gateways to larger networks. 

How Congress can update CISA 2015

To achieve this integration, Congress should ensure any reauthorization addresses four targeted reforms. 

First, clarify definitions. The term “cybersecurity purpose” should explicitly include protections against social engineering threats such as fraud and phishing, ensuring SMBs receive comprehensive coverage for the threats they face.

Second, incentivize more participation among SMBs. Congress should authorize a DHS-managed initiative specifically designed to provide smaller businesses with accessible, actionable threat intelligence and affordable cybersecurity resources. Federal support could take the form of grants, vouchers, or subsidized cybersecurity solutions. 

Third, codify successful operational models into law. This was attempted last year with a bill introduced by Representative Eric Swalwell (D-CA-14) that would codify CISA 2015’s Joint Cyber Defense Collaborative (JCDC). The JCDC has successfully united federal agencies and private companies to effectively respond to high-profile cyber incidents, including the exploitation of Ivanti gateway vulnerabilities and the July 2024 CrowdStrike outage. Currently, JCDC and many similar programs lack explicit statutory authority, making them vulnerable to termination by executive action, which is what happened to the Critical Infrastructure Partnership Advisory Council in March of this year. Codifying such programs ensures sustained and consistent cybersecurity collaboration irrespective of political shifts.

Fourth, rename the law to clearly distinguish it from the Cybersecurity and Infrastructure Security Agency. Cybersecurity acronyms are hard enough as it is. A new name, such as the Cyber Intelligence Sharing and Protection Act (CISPA), a name from an earlier version of CISA 2015, would eliminate the confusion caused by acronym duplication. 

Reauthorizing CISA 2015 with these targeted improvements—clearer definitions, SMB support, codification of proven programs, and a distinct identity—will ensure that SMBs play their part in and benefit from making the next decade of cybersecurity more resilient than the last.


Tanner Wilburn is a recent graduate of the Indiana University Maurer School of Law with an MS in cybersecurity risk management from the Luddy School of Informatics, Computing, and Engineering. 

Sara Ann Brackett is an assistant director with the Cyber Statecraft Initiative, part of the Tech Programs. 

Urmita Chowdhury is an assistant director for trainings and competitions at the Cyber Statecraft Initiative, part of the Tech Programs. 

Related Experts:
Sara Ann Brackett and
Urmita Chowdhury

Image: October 9, 2023: A man uses a computer keyboard in Toronto. (Credit Image: Graeme Roy/The Canadian Press via ZUMA Press) Via REUTERS

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article I Sampled All the Best Mushroom Gummies—Here’s What I Found
Next Article CFPB drops lawsuit against Bank of America, JPMorgan Chase and Wells Fargo over Zelle fraud
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

A Complete Guide to B2B Influencer Marketing in 2025
Computing
Flux 2.6 GA Release and Security Advancements
News
Meet the ‘Relationship Anarchists’ Ditching Romantic Norms
Gadget
How to Cancel Your ChatGPT Subscription? |
Computing

You Might also Like

News

Flux 2.6 GA Release and Security Advancements

5 Min Read
News

Microcurrent Devices: Do They Work and Are They Worth It? We Asked Skin Experts

14 Min Read
News

FCA leads international crackdown on illegal ‘finfluencers’ – UKTN

1 Min Read
News

I replaced Wordle with my own AI-generated games — here’s how to make yours

7 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?