This is your US-China CyberPulse: Defense Updates podcast.
Hey listeners, Ting here, your go-to cyber sleuth diving into the US-China CyberPulse this week—because nothing says "happy 2026" like hackers playing ping-pong with our power grids. Picture this: I'm huddled in my digital war room, caffeine-fueled, as Beijing drops a bombshell on January 14, ordering Chinese firms to ditch US and Israeli cybersecurity tools from giants like Palo Alto Networks, VMware, Fortinet, and Check Point. Reuters reports it's all about "national security concerns," fearing these apps beam secrets back home—classic tit-for-tat after Palo Alto's Unit 42 called out Chinese hackers prowling foreign ministries' Microsoft Exchange servers.
Over here, we're not sleeping. President Trump just inked a $900 billion defense bill banning China-based engineers from Pentagon cloud systems, sparked by ProPublica's exposé on Microsoft's decade-long use of them—complete with "digital escorts" who couldn't tell a backdoor from a doggy door. Defense Secretary Pete Hegseth blasted it on X: "Foreign engineers from China should NEVER access DoD systems." Rep. Elise Stefanik and Sen. Tom Cotton cheered, calling it a loophole slam on Microsoft, with mandatory briefings to Congress by June 1. Hegseth even launched probes and audits—talk about closing the barn door after the Volt Typhoon horses bolted into our water, power, and port systems.
Shifting gears to offense, a House Homeland Security hearing on Tuesday had experts like Frank Cilluffo from Auburn's McCrary Institute yelling for cyber to be woven into military doctrine. "Cyber transcends domains," he said, slamming our "hamstrung" restraint as China pre-positions malware for a Taiwan showdown. Joe Lin of Twenty Technologies nailed it: these aren't breaches, they're "continuous shaping operations." Drew Bagley from CrowdStrike warned against vigilante hack-backs, pushing pros at Cyber Command and NSA—who, oops, just got staff cuts. CISA's Joint Cyber Defense Collaborative and NSA's Cybersecurity Collaboration Center are stepping up private partnerships, but we need more juice.
On the tech frontier, federal agencies kicked off Year of Quantum Security 2026 in D.C. on January 12, hosted by Holland & Knight and the Quantum Industry Coalition. It's dual-threat prep: shielding against quantum hacks now while locking down research supply chains with allies—because encryption doesn't respect borders.
Meanwhile, China's Cybersecurity Law amendments hit January 1, jacking fines to RMB 10 million for wrecking critical infrastructure, broadening overseas enforcement if you "endanger" their nets. AI shoutouts too, propping domestic players like 360 Security.
Whew, the pulse is racing—US fortifying, China circling wagons. Stay vigilant, listeners. Thanks for tuning in—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta
This content was created in partnership and with the help of Artificial Intelligence AI