The U.S. Securities and Exchange Commission (SEC) has voluntarily dismissed its landmark lawsuit against SolarWinds Corp. and its Chief Information Security Officer (CISO), Timothy G. Brown. The case, which alleged fraud and internal control failures related to the 2020 SUNBURST cyberespionage campaign, was withdrawn on November 20, 2025. The SEC's lawsuit had been a source of major concern across the cybersecurity industry, with many professionals fearing it would establish personal liability for CISOs following major cyberattacks and discourage open communication about security weaknesses. The dismissal, which follows a July 2024 court ruling that threw out a significant portion of the charges, has been hailed as a "welcome vindication" by SolarWinds and a relief to security leaders nationwide.
The lawsuit, filed in October 2023, was a pivotal moment in cybersecurity regulation. The SEC accused SolarWinds and CISO Timothy G. Brown of violating antifraud provisions of federal securities laws. The core allegations were:
The case was built around the premise that cybersecurity failures constitute a direct risk to investors that must be accurately and transparently disclosed. The SUNBURST incident, attributed to the Russian state-sponsored actor APT29, involved injecting malicious code into SolarWinds' Orion Platform, which was then distributed to thousands of customers, including U.S. federal agencies.
The dismissal was filed as a joint motion to dismiss the action "with prejudice," meaning the SEC cannot refile the same claim in the future. The agency cited its "discretion" in the filing, without providing a detailed explanation for its reversal.
The primary entities involved were SolarWinds Corp. and its CISO, Timothy G. Brown. However, the implications of the case extended to the entire community of publicly traded companies and their cybersecurity leadership. CISOs and their legal counsel across all industries were watching the case closely, as a ruling against SolarWinds and Brown could have fundamentally altered the landscape of executive liability and corporate risk management. The dismissal directly benefits Brown, who avoids a potentially career-ending legal battle, and SolarWinds, which can now move past the legal overhang from the SUNBURST attack.
The SEC's decision to drop the case carries significant implications for the cybersecurity industry and corporate governance:
Despite the dismissal, the SEC's focus on cybersecurity is not diminishing. The case served as a powerful warning to all public companies. Organizations should continue to strengthen their governance and disclosure practices:
While this is a legal and policy issue, the underlying event was a technical failure. Mitigations against future SUNBURST-style attacks remain critical:
M1045 - Code Signing.M1030 - Network Segmentation to limit the blast radius of a compromise. Critical systems, like build environments, should be isolated from the general corporate network.M1047 - Audit to log and monitor all activity on critical systems, enabling faster detection of anomalous behavior.M1026 - Privileged Account Management to control access to sensitive systems and data.Implement strict code signing policies to ensure the integrity of software updates, a key failure point in the original SUNBURST attack.
Maintain comprehensive audit trails of security controls, risk assessments, and disclosure decisions to demonstrate due care and support legal defense.
Harden Active Directory and federated identity services to prevent lateral movement, a key TTP of APT29 post-compromise.
In the context of the original SolarWinds SUNBURST attack, which this lawsuit centered on, implementing a strict Domain Trust Policy is a critical defense. The APT29 actors were adept at lateral movement, often abusing trust relationships between domains and cloud tenants. Organizations should enforce a policy of least privilege for domain and federated trusts. This means auditing all existing trusts, removing any that are unnecessary, and configuring the remaining ones with the most restrictive settings possible, such as SID filtering and selective authentication. For hybrid environments, this extends to Azure AD Connect and ADFS configurations. Review and limit the permissions of service principals and applications in Azure AD, particularly those with high-privilege directory roles. By hardening these trust policies, an organization can create internal segmentation that contains a breach, preventing an attacker who gains a foothold (e.g., via a supply chain attack) from easily escalating privileges and moving across the entire enterprise network.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats