Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsCISA Retires 10 Emergency Cyber Orders in Rare Bulk Closure
CISA Retires 10 Emergency Cyber Orders in Rare Bulk Closure
Cybersecurity

CISA Retires 10 Emergency Cyber Orders in Rare Bulk Closure

•January 9, 2026
0
BleepingComputer
BleepingComputer•Jan 9, 2026

Companies Mentioned

Microsoft

Microsoft

MSFT

Cisco

Cisco

CSCO

VMware

VMware

VMW

SolarWinds

SolarWinds

SWI

Why It Matters

Consolidating emergency orders into BOD 22‑01 streamlines compliance and strengthens the federal government’s ability to mitigate critical vulnerabilities quickly, setting a benchmark for broader cyber‑risk governance.

Key Takeaways

  • •CISA closed ten emergency directives from 2019‑2024.
  • •All actions now covered by Binding Operational Directive 22‑01.
  • •BOD 22‑01 uses KEV catalog to mandate agency patching.
  • •Federal agencies have up to six months for older CVEs.
  • •New high‑risk flaws require patches within two weeks or less.

Pulse Analysis

The Cybersecurity and Infrastructure Security Agency (CISA) announced an unprecedented bulk retirement of ten Emergency Directives, the fastest‑acting mandates it has issued since 2019. These directives were originally deployed to force immediate mitigation of critical flaws such as the SolarWinds supply‑chain breach, Windows Print Spooler exploits, and VMware vulnerabilities. By confirming that required remediation steps are complete, CISA signals that the agency’s rapid‑response toolkit is transitioning from ad‑hoc emergency orders to a more structured, long‑term framework. This move reduces administrative overhead for federal IT teams while preserving the ability to react swiftly to emerging threats.

Central to this transition is Binding Operational Directive 22‑01, which consolidates the Known Exploited Vulnerabilities (KEV) catalog into a single, enforceable mandate. Under BOD 22‑01, civilian agencies must patch listed CVEs by dates set by CISA—typically within two weeks for newly disclosed flaws and up to six months for legacy issues. The directive also grants CISA authority to impose accelerated timelines when a vulnerability poses an imminent national‑security risk, as demonstrated by the one‑day patch requirement for critical Cisco CVEs. This standardized approach streamlines compliance and improves visibility across the federal ecosystem.

The retirement of these emergency orders underscores a maturing federal cyber‑risk management strategy that balances rapid response with sustainable governance. By embedding threat intelligence into the KEV catalog and tying remediation to clear deadlines, CISA reduces the likelihood of repeat incidents and sets a benchmark for private‑sector partners seeking similar rigor. As threat actors continue to weaponize zero‑day exploits, the agency’s shift toward proactive, catalog‑driven patching positions the government to mitigate damage before vulnerabilities are widely exploited.

CISA retires 10 emergency cyber orders in rare bulk closure

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...