About this episode
This is your Tech Shield: US vs China Updates podcast.Hey listeners, Ting here, your friendly neighborhood China?cyber nerd, and tonight’s episode is “Tech Shield: US vs China,” fresh from this week’s battlefield in the wires.Let’s start with the Pentagon, because that’s where the really spicy policy just dropped. Asia Times reports that a new US defense law now flat?out bans China?based IT engineers from accessing Pentagon cloud systems, after a ProPublica investigation showed Microsoft had been using engineers in China to help run Defense Department infrastructure for almost a decade. Lawmakers like Elise Stefanik and Tom Cotton basically accused Microsoft of a national security faceplant, and Defense Secretary Pete Hegseth said foreign engineers should never touch DoD systems. That ban is now codified, with annual oversight briefings baked in. As a defensive move, this closes an insane contractor loophole, but it also exposes how thin US vetting really was on the cloud side.On the frontline of active attacks, Paranoid Cybersecurity reports Chinese state?linked hackers are exploiting a zero?day in Cisco’s AsyncOS, hitting Email Security Appliances and Secure Email and Web Manager boxes in espionage campaigns. Cisco has pushed patches and mitigations, but here’s the uncomfortable truth: when your email gateway is compromised, your “perimeter” is a polite fiction. The response is solid but reactive; Beijing’s operators are still setting the tempo.Zoom out and you see Washington trying to compensate with money and math. AInvest describes how the US is pouring billions into AI?driven cybersecurity, quantum?resistant systems, and autonomous defense tools under frameworks like America’s AI Action Plan and the Quantum Leadership Act. Think Palantir and Anduril getting big DoD contracts to build AI?powered threat detection, secure?by?design infrastructure, and quantum?safe communications. That’s your emerging tech shield: less human eyeballs, more machine?speed defense.On the intelligence side, Jack Poulson’s reporting on DarkOwl and WireScreen shows US agencies leaning hard into open?source and dark?web intel on Chinese commercial hackers and security firms like Antiy and ThreatBook. WireScreen pitches itself as the go?to platform for mapping millions of China?connected entities and ownership webs so the Pentagon’s Defense Innovation Unit can spot tech compromise. It’s not glamorous like zero?days, but this is the plumbing behind sanctions, export controls, and supply?chain defense.So, effectiveness check: policy locks like the Pentagon cloud ban reduce high?risk exposure; rapid Cisco patching shrinks dwell time; AI and quantum funding prepares for the next decade; and OSINT platforms give the US more visibility into China’s ecosystem. The gaps? Still too reactive on vulnerabilities, too dependent on a small set of vendors, and still cleaning up yesterday’s mistakes in cloud trust