Confronting China’s Expanding Cyber Threats [Threat Vector]
CyberWire Daily
N2K Networks, Inc.
4.6 • 1K Ratings
🗓️ 1 January 2026
⏱️ 21 minutes
🧾️ Download transcript
Summary
Transcript
Click on a timestamp to play from that location
| 0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
| 0:09.7 | I think for threat intelligence trying to be effective, though, is it needs to be contextualized and actionable, and it can't be slow and gated |
| 0:23.6 | and working through bureaucratic means in order to get the information shared. |
| 0:27.6 | So the reality there is there is still a lot of person-to-person and organization-to-organization |
| 0:32.6 | sharing that's going on, but I think that's actually happening in a much more effective level than previously. |
| 0:38.3 | The Russia-Ukraine invasion really was a catalyst for a lot of that. |
| 0:42.3 | And that's not to say that there wasn't great information sharing going on before, because there was. |
| 0:47.3 | But when it actually came time to say, wow, okay, we need, there are people's lives we need to protect here, |
| 0:53.3 | I think a lot of those barriers broke down. |
| 1:00.2 | Welcome to Threat Vector, the Palo Alto Networks podcast, |
| 1:03.3 | where we discuss pressing cybersecurity threats and resilience |
| 1:05.9 | and uncover insights into the latest industry trends. |
| 1:09.5 | I'm your host, David Moulton, Senior Director of Thought Leadership for Unit 42. |
| 1:19.4 | Today I'm speaking with Wendy Whitmore, chief security intelligence officer at Palo Alto Networks. |
| 1:25.3 | Wendy brings more than two decades of experience leading incident response and threat intelligence |
| 1:29.6 | teams at organizations like Mandia, CrowdStrike, IBMX Force, and Unit 42 for Palo Alto |
| 1:35.3 | Networks. |
| 1:36.3 | She's an inaugural member of the DHS Cyber Safety Review Board and serves on the Cybersecurity |
| 1:41.3 | Advisory Board at Duke University and the University of San Diego. |
| 1:45.9 | Wendy is a highly respected voice in national and global cybersecurity strategy, |
| 1:49.7 | with extensive experience countering nation-state and AI-driven threats. |
| 1:54.8 | Today, we're going to talk about the evolving scale and sophistication of Chinese nation-state cyber threats, |
... |
Transcript will be available on the free plan in 11 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2026.

