This is your US-China CyberPulse: Defense Updates podcast.
Hey listeners, it’s Ting, your go-to for all things China, cyber, and hacking — and wow, I hope you’ve had your coffee, because the US-China CyberPulse has been on overdrive this week.
Let’s jump right into the action. The DOJ dropped the kid gloves on July 8, officially ending its 90-day grace period for the Data Security Program, or DSP. Now, if your company has been letting sensitive data pass through to China, Russia, or a handful of other adversaries, you could be facing serious heat — think multi-million-dollar fines and up to 20 years in federal prison. So if you’re a CISO, and your vendor list includes anyone tied to mainland China, Hong Kong, or even Macau, you might want to clear your calendar for, I don’t know, the rest of the decade. The era of “good faith efforts” is over; now the DOJ expects airtight compliance and has the muscle to back it.
Congress is also flexing. The Senate Armed Services Committee is cranking up pressure on the Department of Defense to develop a comprehensive cyber deterrence strategy targeting China, especially after eye-popping intrusions by Chinese threat groups like Volt Typhoon and Salt Typhoon. These aren’t your “steal-the-blueprints and run” crews — Volt Typhoon was digging into US maritime infrastructure in Guam, aiming to disrupt military mobilization, while Salt Typhoon was nosing through telecom networks for espionage opportunities. Senators are adamant that the Pentagon get proactive, and the word is out: cyber deterrence is now front and center in national defense.
Meanwhile, the FCC under Jessica Rosenworcel is modernizing its own rules and launched a new Council on National Security to choke off supply chain risks and spy holes in US tech and telecom. And over at the Department of Agriculture, the USDA just rolled out a plan to shield US farmland from Chinese cyber intrusions and block Beijing’s efforts to buy up American agricultural real estate. Why the paranoia? Farms are now decked out with GPS, AI, and networked drones — and if Chinese hackers flip the switch, you could see disruptions that reach from seed to supermarket shelf.
On the innovation front, the National Science Foundation just issued funding to create new AI security frameworks with international partners, a clever countermove to China’s own AI export blitz. These alliances don’t just beef up defenses but set global norms, so hacks and sabotage have fewer places to hide. And if you’re an MBA trying to hack it in cyber, Florida International University is running bootcamps in D.C. that blend tech, policy, and business, prepping the next wave of cyber leaders who actually get the geopolitical stakes.
And yes, the information sharing floodgates are wide open — the Cybersecurity Information Sharing Act is sunsetting soon, but for now, it’s still empowering both public and private sectors to swap intelligence on threats and defenses, keeping that cyber pulse beating strong.
Alright, that’s your US-China CyberPulse. Thanks for tuning in, don’t forget to subscribe for your weekly dose of wit, wisdom, and hacks. This has been a quiet please production, for more check out quiet please dot ai.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta