Rex M. Lee, My Smart Privacy, Interviewed by NTD News
Rex Lee, a cybersecurity expert, shares his thoughts on the U.S. government allowing Nvidia and AMD to sell lower-end AI chips to China.


TechTalk Daily
Rex M. Lee, My Smart Privacy, Interviewed by NTD News
Rex Lee, a cybersecurity expert, shares his thoughts on the U.S. government allowing Nvidia and AMD to sell lower-end AI chips to China.
By Rex M. Lee, Security Advisor, My Smart Privacy
Critical infrastructure operators, defense industry contractors, state and local governments, technology firms, AI data centers, utilities, and the oil & gas sector all face escalating cybersecurity threats, regulatory pressures, and operational risks tied to their reliance on commercial telecom carriers. Owning licensed spectrum and deploying private LTE (pLTE) networks offers not only long-term security and data sovereignty, but also strategic financial benefits.
By Daniel W. Rasmus
Technological revolutions rarely arrive on schedule. They come with fanfare, bold promises, and heavy investment, but their impact often hides in the shadows before it bursts into the open. Artificial intelligence now finds itself in this awkward in-between space. Boardrooms are abuzz with talk of generative AI strategies; enterprises are pouring billions into pilots and partnerships; employees are experimenting with chatbots and copilots. Yet in measurable business terms, most of these efforts appear to fail to deliver returns on the investments.
By Rex M. Lee, Security Advisor, My Smart Privacy
The unprecedented Trump–Intel deal has sparked debate about U.S. tech leadership, national security, and taxpayer accountability. By converting CHIPS Act funds into a 10% equity stake in Intel, Washington is reshaping industrial policy—but at what cost?
Interview with Rex Lee By Don Ma with NTD News
Rex M. Lee, cybersecurity adviser, discussed the U.S. government's deal with Nvidia and AMD to get a cut of revenue from sales of some chips in China.
The Trump administration confirmed an unprecedented deal with Nvidia and AMD to give the U.S. government 15 percent of revenue from sales of some advanced chips in China. For a deep dive, NTD spoke to Rex Lee, cybersecurity adviser at My Smart Privacy and tech journalist.
By Rex M. Lee, Security Advisor/Tech Journalist
A critical vulnerability in Erlang/OTP SSH, tracked as CVE-2025-32433 with a CVSS score of 10.0, has been actively exploited since May 2025, targeting operational technology (OT) networks worldwide. Reported by Hacker News, this flaw, patched in April 2025 with releases OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, stems from a missing authentication issue, allowing attackers to execute arbitrary code without credentials. About 70% of attacks hit OT environments, with 85% targeting healthcare, agriculture, media, and tech sectors in the U.S., Canada, Brazil, India, and Australia. Added to CISA’s KEV catalog in June 2025, exploitation involves reverse shells and industrial port attacks, posing risks to critical infrastructure. Urgent patching and enhanced network monitoring are crucial to mitigate this severe threat to national and economic security.
By Rob Enderle
China’s breakthrough in indium selenide wafer production signals a new phase in its high‑stakes technology race with the U.S.
Assessing the accuracy of the viral claims versus the scientific reality reveals a more nuanced but equally profound story about the future of technology, geopolitics, and the very materials that will power our world.
Let’s unpack what this breakthrough means for China, the West, and the future of semiconductors.
By Teodora Siman - Research Manager, C-Suite Tech Agenda Program
How are CEOs leading through AI, volatility and risk? IDC’s 2025 CEO Survey reveals 5 tech priorities shaping leadership in an AI-driven world.
By Daniel W. Rasmus, Serious Insights
The modern enterprise operates in an increasingly turbulent and uncertain landscape. Traditional, linear planning processes—often treated as fixed blueprints—are failing to keep pace with the rapid cascade of change. Organizations require a more dynamic and adaptive approach: a strategic conversation that integrates knowledge deeply into core operations and decision-making, transforming them into continuous learning entities.
By Rex M. Lee | Investigative Tech Journalist
Today’s AI-infused mobile apps, browsers, chatbots, and gaming platforms don’t just monitor your behavior—they enable multiple companies and governments to monitor, track, and data mine you for profits simultaneously through cross-platform surveillance technologies, often without your knowledge or consent.
And sometimes, without you even using their services…