Your Secure and Responsible Technology Partner

Across the Industry Brief – Issue 6

May 4, 2026 · Policy, Regulation & AI Industry Developments


POLICY & REGULATION


Tags: Analysis | International
Date: April 28, 2026

EU Digital Omnibus trilogue stalls without agreement, leaving August 2 AI Act deadline intact

The second political trilogue on the EU Digital Omnibus on AI concluded on April 28, 2026, without reaching agreement on whether to postpone the AI Act’s high-risk compliance deadline from August 2, 2026, to December 2, 2027. The European Parliament, Council of the EU, and European Commission remain divided on the scope and timing of the proposed deferral. If the Omnibus is not formally adopted before August 2, 2026, the original AI Act’s full suite of high-risk obligations—including for employment-related AI systems such as recruitment, performance evaluation, task allocation, worker monitoring, and termination decisions—will apply as written. The stalled trilogue reflects genuine tensions between accelerating implementation timelines and the practical readiness of member states and industry to comply.

The significance of the April 28 outcome is one of status quo preservation by default. Organizations cannot rely on a deferral materializing; they must treat August 2, 2026, as the operational deadline. The AI Act classifies employment-related AI systems as high-risk, triggering obligations for providers and deployers: impact assessments, technical documentation, conformity assessments, human review, and reporting mechanisms. The lack of trilogue agreement also reflects disagreement on secondary issues, including the final synthetic content watermarking deadline (Parliament proposed November 2, 2026; Council proposed February 2, 2027) and the scope of AI Office enforcement powers. The political calculus has shifted since the March trilogue sessions; some member states have signaled hesitancy about unconditional extension given implementation readiness concerns among their own regulatory authorities.

Organizations with high-risk AI systems operating across the EU should treat August 2, 2026, as a hard compliance deadline and assume no deferral will occur. Compliance planning should focus on the original timeline: impact assessments, documentation, conformity assessment bodies, and deployment safeguards must be finalized well in advance of the deadline. A post-August 2 trilogue agreement could provide relief, but only for systems not yet deployed. The regulatory posture is: implement by August 2 as written, and if the Omnibus is later adopted with deferred timelines, organizations can relax governance burdens retroactively. The status quo approach is safer than betting on political agreement.

Source: https://knowledge.dlapiper.com/dlapiperknowledge/globalemploymentlatestdevelopments/2026/The-Digital-AI-Omnibus-Proposed-deferral-of-high-risk-AI-obligations-under-the-AI-Act


Tags: News | United States
Date: April 30, 2026

State AI laws remain largely unchanged despite federal preemption signals, with California and Colorado advancing enforcement mechanisms

Despite the Trump administration’s December 2025 executive order directing federal agencies to challenge state AI laws as unconstitutional or preempted, state legislatures have continued their regulatory activity largely unabated. California’s Executive Order N-5-26, signed by Governor Gavin Newsom on March 30, 2026, directs state agencies to draft recommendations for AI safety requirements applicable to vendors seeking state contracts, covering bias detection, illegal content mitigation, civil rights protections, and free speech safeguards. Colorado’s SB 205, originally set to take effect on February 1, 2026, was delayed to June 30, 2026, but is now subject to further revision in the March 2026 working group draft, which proposes a reenactment focused on automated decision-making technology with an effective date of January 1, 2027. The continued state activity signals that legal and political uncertainty alone has not deterred legislatures from enacting or advancing AI governance frameworks.

The disconnect between federal preemption rhetoric and state-level momentum reflects the constitutional and political reality that state statutes cannot be revoked by executive order alone. The Trump administration’s stated strategy relies on DOJ litigation, conditional federal funding, and congressional legislation—all of which operate on longer timelines than state lawmaking. New York State’s March 2026 amendments to the RAISE Act realigned the state’s frontier AI framework with California’s Transparency in Frontier AI Act, shifting from deployment restrictions to a transparency and reporting model. Illinois, Utah, Nevada, Maine, and California have all enacted companion chatbot regulations in 2024-2025, and enforcement discussions are accelerating within those states’ attorney general offices. State attorneys general stepped up scrutiny of AI-related practices in 2025 and are expected to continue that trend through 2026, including settlement negotiations with companies using AI in high-stakes domains like employment, housing, and lending.

Organizations operating across multiple U.S. states should treat state AI laws as binding obligations and should not assume federal preemption will materially reduce compliance burdens in the 12-24 month timeframe. California, Colorado, and New York have active regulatory implementations underway, and enforcement timelines are becoming more concrete. The Trump administration’s litigation strategy will take years to litigate and may not succeed; meanwhile, companies must demonstrate compliance with state obligations. The safest approach is to assume state laws remain in force and design compliance programs accordingly. A federal preemption victory could come later and would actually simplify compliance, but relying on it as a primary compliance strategy is operationally risky.

Source: https://www.cooley.com/news/insight/2026/2026-04-24-state-ai-laws-where-are-they-now


Tags: Analysis | United States
Date: April 25, 2026

White House National Policy Framework on AI emphasizes federal preemption and light-touch regulation, signaling legislative direction amid state resistance

The White House’s National Policy Framework for Artificial Intelligence, released on March 20, 2026, has become the primary legislative reference for Republican-led congressional efforts to establish federal AI governance. The Framework recommends federal preemption of state AI laws that “impose undue burdens,” child safety protections, intellectual property safeguards, workforce readiness initiatives, and regulatory sandboxes for AI development. The Framework explicitly calls against creating new federal regulatory bodies, instead tasking existing agencies (FTC, SEC, FDA, NIST) with oversight. Congressional Republicans, including Senator Marsha Blackburn, have drafted legislation (the TRUMP AMERICA AI Act, released March 18, 2026) that operationalizes many of the Framework’s recommendations across 17 titles covering everything from preemption to national security.

The Framework’s approach represents a deliberate shift away from comprehensive, prescriptive governance in favor of principled federal minimalism and state-level carve-outs. The White House explicitly preserves state authority over generally applicable law enforcement, zoning, and state procurement—creating a narrow window where states can regulate AI without triggering preemption. This limited carve-out has prompted resistance from Democratic lawmakers, including Representatives Yvette Clarke and Don Beyer, who argue for stronger federal accountability, testing standards, and liability frameworks. Senate Commerce Ranking Member Maria Cantwell has signaled that any preemption language that goes too far could face Democratic opposition in any future negotiation. The legislative reality is that the Framework represents a Republican baseline, not bipartisan consensus. Passage through both chambers would require either unified Republican control or significant Democratic concessions on preemption scope.

Organizations should monitor congressional legislative action and treat the Framework as a strategic planning document for federal direction, not a binding standard. The likelihood of passage in 2026 is moderate; if passed, preemption language could materially reduce state-by-state compliance complexity. However, organizations should not reduce current state compliance planning based on the Framework’s existence; instead, dual-track compliance strategies—state-level adherence now, federal preemption adoption if legislation passes—are prudent. The debate over preemption will likely continue through 2026 and into 2027, meaning state obligations remain primary compliance drivers for the foreseeable future.

Source: https://www.consumerfinancemonitor.com/2026/04/08/the-white-houses-national-policy-framework-for-artificial-intelligence-what-it-means-and-what-comes-next/


AI INDUSTRY


Tags: Alert | Security | Industry
Date: April 20-24, 2026

ADT discloses breach affecting 10+ million customer records, exposing vulnerability to voice phishing and identity compromise tactics

ADT, a leading home security provider, publicly disclosed on April 24, 2026, that it had detected unauthorized access on April 20. The cybercriminal group ShinyHunters claimed responsibility and claimed access to more than 10 million customer records. ADT stated that customer alarm systems were not compromised and no payment card information was stolen; however, the exposed data includes customer names, addresses, and account information tied to a company responsible for protecting residential security. ShinyHunters reportedly provided ADT until April 27 before publicly releasing stolen data, a typical extortion timeline. The attack vector, according to BleepingComputer reporting, involved voice phishing (vishing) rather than exploitation of technical vulnerabilities—attackers convinced employees to provide credentials or access permissions through social engineering.

The ADT incident illustrates a broader shift in attacker methodology: rather than exploiting software flaws or deploying sophisticated malware, threat actors are increasingly bypassing technical controls entirely and targeting human trust and identity systems. The customer data exposed to ADT customers carries particularly high risk value because it maps home locations to security service adoption and customer identity, enabling attackers to execute highly targeted impersonation attacks. An attacker with ADT customer records can call a household claiming to be ADT support, request credential verification, and gain access to alarm system configuration or home automation integrations. ADT’s response included internal breach detection, rapid termination of unauthorized access, forensic investigations with outside experts, law enforcement notification, and customer notification within four days of detection. The public disclosure was faster than many organizations, but the forensic investigation is ongoing regarding the full scope and duration of attacker access.

Organizations providing home security, physical protection, or identity-linked services should assess their exposure to voice phishing campaigns and implement identity-based defenses rather than relying solely on technical access controls. Threat actors are demonstrating increasing sophistication in social engineering targeting employees with access to customer data or account systems. The ADT case signals that companies responsible for protecting physical assets or managing high-value personal data face unique risk from identity compromise, even when technical systems remain uncompromised. Customer notification and regulatory obligations vary by state, but the reputational damage from a security company breach carries long-term consequences. Organizations should prioritize voice call authentication, employee security awareness training, anomalous access detection, and rapid incident response protocols.

Source: https://haveibeenpwned.com/Breach/ADT


Tags: Alert | Security | Vulnerability
Date: April 23, 2026

CISA adds eight exploited vulnerabilities to Known Exploited Vulnerabilities catalog, including critical Cisco SD-WAN and PaperCut flaws

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog on April 23, 2026, marking a significant expansion of actively exploited flaws requiring immediate federal agency attention and urgent patching by all organizations. The additions include three critical Cisco Catalyst SD-WAN Manager flaws (CVE-2026-20122, CVE-2026-20128, CVE-2026-20133) with CVSS scores ranging from 6.5 to 7.5, a critical PaperCut NG/MF authentication bypass (CVE-2023-27351, CVSS 8.2), a JetBrains TeamCity path traversal vulnerability (CVE-2024-27199, CVSS 7.3), and others affecting enterprise software used widely in cloud and hybrid environments. CISA’s KEV catalog additions trigger Binding Operational Directive (BOD) 22-01, which mandates that all Federal Civilian Executive Branch agencies remediate listed vulnerabilities by specified due dates; CISA strongly encourages all organizations to prioritize remediation regardless of sector.

The Cisco flaws are particularly significant because they affect SD-WAN infrastructure—the overlay networks that many enterprises use for secure, efficient multi-site connectivity. CVE-2026-20122 allows authenticated local attackers to gain vManage user privileges; CVE-2026-20128 exposes stored passwords in recoverable format; CVE-2026-20133 leaks sensitive information to remote attackers. Organizations using Cisco SD-WAN have reportedly known about these flaws since March 2026, but active exploitation only became widespread by late April. Threat actor UAC-0233 has been observed exploiting two Zimbra Collaboration Suite vulnerabilities (CVE-2025-48700 and CVE-2025-66376) against Ukrainian entities since September 2025, exfiltrating mailbox contents, MFA backup codes, and global address books. The expansion of the KEV catalog to eight new flaws in one update underscores the acceleration of vulnerability exploitation timelines globally.

Organizations should immediately inventory their use of Cisco SD-WAN infrastructure, PaperCut print management, JetBrains TeamCity, Zimbra email, Kentico CMS, and Quest KACE appliances and prioritize patching above all other IT work. The KEV catalog updates signal that these vulnerabilities are not theoretical; they are being exploited in the wild by multiple threat actors. Enterprises using these products should assume exploitation is already occurring in their environments if patches have not been deployed. The average time to remediate known vulnerabilities has increased to 74 days according to recent data, but exploits are routinely arriving within 24 hours of disclosure; this timeline mismatch is creating a critical vulnerability management gap that organizations must address operationally.

Source: https://thehackernews.com/2026/04/cisa-adds-8-exploited-flaws-to-kev-sets.html