This is your Tech Shield: US vs China Updates podcast.
Here’s Ting coming at you live from the cyber trenches with your Tech Shield: US vs China Updates! If the cold war had code, it’d look like this week. Let’s jack straight into what’s got U.S. cyber defenders both strutting and sweating.
On the regulatory battlefield, President Biden’s Executive Order 14105, finalized in January, is still shaking things up. This order slammed the gates shut on U.S. investments flowing into Chinese companies deep in semiconductors, artificial intelligence, and quantum computing. Treasury kicked it up a notch, now roping in things like debt finance and joint ventures with Chinese entities. Plus, the Department of Commerce and Treasury just dumped another fifty Chinese companies — including the infamous Integrity Technology Group — onto the entity list, basically calling them out for helping Beijing cyberattack American infrastructure. Talk about name and shame at government scale.
Everywhere you look, demand for U.S. cyber talent is booming. Booz Allen Hamilton just inked a $421 million deal with Homeland Security, plugging its expertise into CISA’s diagnostics and mitigation mission. The Protecting Americans’ Data from Foreign Adversaries Act (mouthful, but PADFAA for the acronym fans) turned the screws on data brokers, making it way harder for sensitive info to sneak over to China. Financial firms are scrambling too: the SEC’s Cyber Disclosure Rule has everyone rushing to patch vulnerabilities and beef up software hygiene. All driven by the government and, let’s be honest, a healthy dose of PR nightmares about supply chain sabotage.
Chinese tech is feeling the squeeze. With semiconductors and AI start-ups struggling to source key U.S. components, there’s been a big old brain freeze in innovation. The LiDAR scene? Beijing is pushing hard, but the U.S. is clamping down on importing Chinese LiDAR tech — after all, would you want your self-driving cars or traffic cameras pinging data to the PLA? I didn’t think so.
Not all is kumbaya stateside though. The Cybersecurity Information Sharing Act of 2015 is wheezing toward expiration. If Congress can’t pull off a reauthorization, sharing cyber threat intel might drag back to the Stone Age — making everyone’s risk dashboards light up like Times Square. Industry leaders like Booz Allen and CISA’s own director are practically begging lawmakers to not let this crucial law expire.
On the threat front, the FBI flashed an alert after spotting China-aligned group TA415 pulling sneaky heists on policy experts via VS Code remote tunnels. And don’t even try to sleep on SEO poisoning — a classic, but now hard-targeting Chinese-speaking professionals with malware traps disguised as software updates. The U.S. responded with advisories for both government and the private sector, pivoting hard to zero-trust, enhanced supply chain verification, and beefed-up disclosure requirements.
How effective is all this? Experts agree — “whole-of-government” beats piecemeal, and recent sanctions show the U.S. can still outmaneuver state-backed cyber gangs, at least for now. But gaps remain: the expiration of CISA 2015 threatens seamless info sharing, supply chains can be tough to sanitize fully, and enforcement delays on issues like TikTok show that even the biggest stick sometimes gets tangled in red tape.
Listeners, this cyber tug-of-war isn’t slowing down. If you’re in security, double-check your vendor list, patch now, and stay glued for more advisories. Thanks for tuning in! Be sure to subscribe so you don’t miss your weekly injection of cyber clarity and China channel politics.
This has been a quiet please production, for more check out quiet please dot ai.
For more
http://www.quietplease.aiGet the best deals
https://amzn.to/3ODvOtaThis content was created in partnership and with the help of Artificial Intelligence AI