Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

brian_greenberg@infosec.exchangeB

brian_greenberg@infosec.exchange

@brian_greenberg@infosec.exchange
About
Posts
9
Topics
9
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • He Built the Definitive Epstein Database—and It Consumed His Life
    brian_greenberg@infosec.exchangeB brian_greenberg@infosec.exchange

    He Built the Definitive Epstein Database—and It Consumed His Life

    The data engineer started as a casual reader of the Jeffrey Epstein files. Then he became obsessed, and built the most extensive network graph of the sexual predator’s shadowy world.

    Link Preview Image
    He Built the Definitive Epstein Database—and It Consumed His Life

    The data engineer started as a casual reader of the Jeffrey Epstein files. Then he became obsessed, and built the most extensive network graph of the sexual predator’s shadowy world.

    favicon

    WIRED (www.wired.com)

    Uncategorized

  • Don’t blame your strategy if a transformation fails.
    brian_greenberg@infosec.exchangeB brian_greenberg@infosec.exchange

    Don’t blame your strategy if a transformation fails. Most initiatives don’t fall apart because of a bad plan. They fail because people naturally resist changes to their routines. I’ve watched leaders invest millions in new systems but nothing in the people who need to use them. A memo alone won’t create a new culture. Real change takes place in the difficult middle stage. You need to recognize what people are giving up before they’ll accept something new. If you ignore the mental pushback, your team will just wait for things to return to normal. Good leaders address that resistance instead of pretending it isn’t there.

    🧠 Resistance is a survival mechanism, not a lack of loyalty.
    ⚡ Success depends on how you handle the "neutral zone."
    🎓 Empathy is the only tool that actually reduces friction.
    🔍 Start by listening to the fears of your front line.

    https://www.fastcompany.com/91492312/change-doesnt-fail-by-itself-it-fails-because-people-resist-it
    #Leadership #ChangeManagement #CompanyCulture #FutureOfWork

    Uncategorized leadership changemanagemen companyculture futureofwork

  • You probably think your data floats through the air.
    brian_greenberg@infosec.exchangeB brian_greenberg@infosec.exchange

    You probably think your data floats through the air. It actually sits in the mud. Engineers are currently pulling the world's first fiber-optic ocean cable off the Atlantic floor. TAT-8 changed the world in 1988 by turning your voice into pulses of light. It only lasted 14 years before it broke, but it proved we could wire the planet. We're recycling the metals now. Workers have to coil the glass fibers by hand on a ship to prevent them from snapping. It's a reminder that our life depends on thin strands of glass sitting in the dark.

    🧠 TAT-8 carried 40,000 phone calls at once.
    ⚡ Sharks used to bite the early trial cables.
    🎓 The ship crew is recycling 1,012 km of line.

    https://www.wired.com/story/say-goodbye-to-the-undersea-cable-that-made-the-global-internet-possible/
    #InternetHistory #Technology #Telecoms

    Uncategorized internethistory technology telecoms

  • In the world of private equity, the leadership team is the most significant factor in a portfolio company's success.
    brian_greenberg@infosec.exchangeB brian_greenberg@infosec.exchange

    In the world of private equity, the leadership team is the most significant factor in a portfolio company's success. Many firms still rely on gut instinct or a familiar Rolodex when appointing executives. However, the most successful investors are shifting toward a rigorous, data-backed approach to talent. They recognize that an executive who thrived in a stable corporate environment might fail in the high-velocity, high-leverage world of a PE-backed exit strategy.

    Building the right team requires looking beyond the resume and analyzing how a leader’s specific competencies align with the value creation plan. You cannot expect a turnaround specialist to manage a period of aggressive organic growth effectively. The goal is to move past individual brilliance and focus on how the executive team functions as a unit under pressure.

    🧠 Effective PE firms align executive assessments with the specific goals of the investment thesis.
    ⚡ Speed to value is the primary driver for leadership decisions.
    🎓 Success depends on the team's ability to execute a high-stakes pivot within a short window.
    🔍 Behavioral data is becoming as important as financial performance when evaluating a CEO.

    https://rhrinternational.com/blog/building-the-right-executive-team-in-private-equity-portfolio-companies/
    #PrivateEquity #ExecutiveSearch #ValueCreation #HumanCapital #Leadership #RHRInternational @RHR_International

    Uncategorized privateequity executivesearch valuecreation humancapital leadership

  • The honeymoon phase of AI-driven productivity is meeting the harsh reality of system stability.
    brian_greenberg@infosec.exchangeB brian_greenberg@infosec.exchange

    The honeymoon phase of AI-driven productivity is meeting the harsh reality of system stability. Amazon has officially updated its internal policies to require senior engineers to sign-off for any code changes assisted by generative AI. This move follows a series of significant service disruptions—referred to internally as "high blast radius" incidents—where AI-generated code led to major product outages.

    For a company that values speed and a "you build it, you run it" culture, this is a massive shift. It turns out that while AI can write code in seconds, the cost of an error at AWS scale can be measured in hours of downtime and millions in lost revenue. We are seeing a necessary correction: AI is a powerful assistant, but it cannot yet be trusted with the keys to the kingdom without a seasoned human expert verifying the logic.

    🧠 Amazon now mandates senior review for all AI-assisted code deployments.
    ⚡ The policy change follows a spike in high-priority Sev2 incidents.
    🎓 Senior engineers must now act as the ultimate "bar raisers" for synthetic code.
    🔍 This internal friction highlights the hidden costs of AI-driven development.

    https://arstechnica.com/ai/2026/03/after-outages-amazon-to-make-senior-engineers-sign-off-on-ai-assisted-changes/
    #EngineeringManagement #CloudComputing #GenerativeAI #security #privacy #cloud #infosec #cybersecurity

    Uncategorized engineeringmana cloudcomputing generativeai security privacy

  • The line between national security and political surveillance is thinning.
    brian_greenberg@infosec.exchangeB brian_greenberg@infosec.exchange

    The line between national security and political surveillance is thinning. Congressional Democrats just launched an inquiry into the Department of Homeland Security regarding its use of administrative subpoenas. Unlike the subpoenas you see in courtroom dramas, these do not require a judge’s signature. They allow federal agencies to demand personal information and internal communications directly from technology companies with almost zero outside oversight.

    This investigation follows reports that DHS used these "judge-free" demands to gather data on Americans who criticized the agency on social media. It is a significant moment for anyone in the tech industry. When the government can compel your data without a warrant, the First Amendment starts to look very fragile. You should watch how these tech firms respond to the inquiry, as it will set the standard for how they protect your information from administrative overreach.

    🧠 Lawmakers are demanding to know how often DHS uses subpoenas without judicial review.
    ⚡ The inquiry follows evidence that critics of agency policy were specifically targeted.
    🎓 Major tech platforms must now disclose their internal protocols for handling these federal demands.
    🔍 Civil liberties groups are pushing for new legislation to require a judge’s approval for all data seizures.

    https://www.washingtonpost.com/nation/2026/03/02/subpoenas-free-speech-congress-investigation/
    #DataPrivacy #DigitalRights #TechLaw #security #privacy #cloud #infosec #cybersecurity

    Uncategorized dataprivacy digitalrights techlaw security privacy

  • The recent Iranian 🇮🇷 cyber attack on Stryker, a Michigan-based medical device giant, marks a sobering escalation in the digital shadow war.
    brian_greenberg@infosec.exchangeB brian_greenberg@infosec.exchange

    The recent Iranian 🇮🇷 cyber attack on Stryker, a Michigan-based medical device giant, marks a sobering escalation in the digital shadow war. Thousands of employees woke up yesterday to find their laptops and cellphones remotely wiped and disabled. This was not a standard data breach but a targeted disruptive operation launched by the Handala hacking group, which has documented ties to the Iranian Ministry of Intelligence.

    The attackers did not use traditional malware. Instead, they compromised the company’s Microsoft Intune account—the very platform used by IT departments to manage and secure corporate devices. By triggering the remote wipe feature intended for lost or stolen hardware, the hackers effectively paralyzed the workforce. This incident serves as a stark reminder that our greatest security assets can quickly become our most significant liabilities when access is compromised.

    🧠 Hackers hijacked the Microsoft Intune management console to wipe employee devices.
    ⚡ Handala Team claims the attack is retaliation for a recent missile strike on an Iranian school.
    🎓 This is the first major Iranian cyberattack on a U.S. firm since current hostilities began.
    🔍 Sophos and other security firms have officially linked the perpetrators to Iranian state intelligence.

    https://www.nbcnews.com/world/iran/iran-appears-conducted-significant-cyberattack-us-company-first-war-st-rcna263084
    #CyberWarfare #TechSecurity #Geopolitics #War #security #privacy #cloud #infosec #cybersecurity

    Uncategorized cyberwarfare techsecurity geopolitics war security

  • We have spent two years treating AI like a new toy.
    brian_greenberg@infosec.exchangeB brian_greenberg@infosec.exchange

    We have spent two years treating AI like a new toy. The novelty of a bot that can summarize a meeting is gone. Now the board wants to see the bill and the savings. Many companies are trapped in pilot purgatory. This happens when you test everything and commit to nothing.

    The shift to production is where the real work begins. It is easy to run a small test with a few users. It is difficult to change how your legal team reads a contract. Focus on one process that costs you too much time. Fix that one thing and then move to the next.

    🧠 Stop the cycle of constant demos.
    ⚡ Deploy tools for the whole team.
    🎓 Focus on tasks like document review.
    🔍 Measure the cost of each transaction.

    https://www.wsj.com/cio-journal/piloting-ai-tools-isnt-cool-anymore-dafb6773
    #AI #TechLeadership #BusinessStrategy

    Uncategorized techleadership businessstrateg

  • Often, we entrust a single company with the keys to our entire lives.
    brian_greenberg@infosec.exchangeB brian_greenberg@infosec.exchange

    Often, we entrust a single company with the keys to our entire lives. Conduent is one of those companies and they manage the vast digital paperwork for government agencies and state payrolls. This week they lost 12 billion records. It is the largest data failure in history, and we built a system with a single point of failure. Thieves now have the data to file for your tax refund or steal your benefits. The volume of this leak means your identity is likely available for sale. You must act to protect your money before a criminal uses your name.

    🧠 12 billion records leaked from government service portals.
    ⚡ Social Security numbers and bank details are now public.
    🎓 Criminals use this data to intercept unemployment checks.
    🥶 Freeze your Credit NOW to stop identity thieves from opening new loans‼️

    https://gizmodo.com/likely-the-largest-breach-in-u-s-history-what-you-need-to-know-about-the-conduent-fiasco-2000725930
    #DataBreach #Privacy #CyberSecurity #security #privacy #cloud #infosec #cybersecurity

    Uncategorized databreach privacy cybersecurity security cloud
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups