Brian Greenberg 

@brian_greenberg@infosec.exchange
236 Followers
197 Following
528 Posts
CIO by day, cybersecurity professor & Forbes Contributor by night, and a firm believer that the best ideas start with good coffee. I’m passionate about using AI, cloud tech, and leveraging system dynamics to make work (and life) a little easier.
Outside of work, I’m either reading/writing in some indie coffee house, hiking shady trails along the river, or adding to my ever-growing collection of houseplants.
I’m always learning, always leading, and always up for a good book or a new coffee house to explore.
#CyberSecurity #systemstheory #hiking #philosophy #actor #improviser #storyteller #coffee house addict
📍Chicago, IL 
🦋🥾☕️🎭🤖🪴✍️
Bloghttps://briangreenberg.net
Githubhttps://github.com/bjgreenberg
Gravatarhttps://gravatar.com/bjgreenberg
Threadshttps://www.threads.net/@bjgreenberg
LinkedInhttps://linkedin.com/in/bjgreenberg
LinkTreehttps://linktr.ee/brian.greenberg

For years, national security debates focused on chips, networks, and software. This week, a U.S. senator in one of the top intelligence roles suggested we may have been watching the wrong frontier. The next Huawei, he warned, isn’t building routers. It’s collecting DNA.

BGI’s rise worries U.S. officials not because genomics is inherently dangerous, but because scale changes meaning. At global volumes, genetic data stops being just medical information and starts looking like strategic infrastructure. Combined with AI, it can support surveillance, population modeling, and long-term military research. That’s why Senator Mark Warner described the situation in unusually blunt terms: “It’s terrifying.” Could this lead to biological warfare?

There’s a familiar pattern here. State-backed expansion, early global access, and standards-setting before governments grasp the implications. Huawei followed it in telecom. Warner fears BGI is following it in biotech. And once again, lawmakers are asking whether the response is arriving after the architecture is already in place.

The deeper issue is not China alone. It’s whether intelligence systems built to watch governments can adapt quickly enough to track commercial technology that quietly becomes national power. In a world where data defines advantage, spying isn’t just about secrets anymore. It’s about understanding who controls the future inputs.

TL;DR
🧠 DNA is being treated as strategic data
⚡ Biotech joins chips and AI as intel priority
🎓 Commercial tech now shapes security risk
🔍 Standards-setting may decide long-term power

https://www.cnbc.com/2025/12/06/china-us-technology-spying-senate-concerns.html

#Cybersecurity #NationalSecurity #Biotechnology #TechPolicy #Geopolitics #security #privacy #cloud #infosec

This Gmail hack is unsettling not because it’s flashy, but because it’s bureaucratic. Attackers aren’t breaking encryption or outsmarting algorithms. They’re filling out forms. By changing an account’s age and abusing Google’s Family Link feature, they can quietly reclassify an adult user as a “child” and assume parental control. At that point, the rightful owner isn’t hacked so much as administratively erased.

The clever part is that everything happens inside legitimate features. Passwords are changed. Two-factor settings are altered. Recovery options are overwritten. And when the user tries to get back in, Google’s automated systems see a supervised child account and do exactly what they were designed to do: say no.

Google says it’s looking into the issue, which suggests this wasn’t how the system was supposed to work. But it’s a reminder of an old lesson. Security failures often happen when protective mechanisms are combined in ways no one quite imagined. The tools aren’t broken. The assumptions are.

There’s no dramatic fix here, only mildly annoying advice that suddenly feels urgent. Review recovery settings. Lock down account changes. Use passkeys. Because once an attacker controls the recovery layer, proving you’re you can become surprisingly difficult.

TL;DR
🧠 Family safety tools are being weaponized
⚡ Account recovery can be shut down entirely
🎓 Legitimate features enable the lockout
🔍 Prevention matters more than appeals

https://www.forbes.com/sites/daveywinder/2025/12/07/google-looking-into-gmail-hack-locking-users-out-with-no-recovery

#Cybersecurity #Gmail #IdentitySecurity #AccountRecovery #DigitalRisk #security #privacy #cloud #infosec

NATO’s latest cyber exercise is a useful reminder that cyber defense is rarely dramatic and never tidy. Fifteen hundred defenders from across the alliance spent days responding to simulated attacks designed to be confusing, imperfect, and inconvenient. In other words, realistic.

What’s notable is what the exercise is not about. There’s no emphasis on secret weapons or breakthrough technology. The hard part is coordination: sharing information across borders, making decisions with incomplete data, and responding before certainty arrives. That’s where most real incidents succeed or fail.

The drills don’t trigger Article 5, and that’s intentional. This isn’t about retaliation. It’s about discovering friction while the consequences are still fictional. The goal is to surface weak handoffs, unclear authority, and quiet assumptions that only become obvious under pressure.

The takeaway is refreshingly unromantic. Cyber resilience isn’t built by brilliance alone. It’s built by practicing confusion together beforehand.

TL;DR
🧠 NATO rehearses real-world cyber chaos
⚡ Coordination matters more than clever tools
🎓 Exercises reveal human and process gaps
🔍 Preparedness beats improvisation

https://www.theregister.com/2025/12/10/nato_cyber_training/

#Cybersecurity #NATO #CyberDefense #RiskManagement #Leadership #Preparedness #security #privacy #cloud #infosec

Crisis in Icebergen: How NATO crafts stories to sharpen cyber skills

feature: 1,500 military digital defenders spent the past week cleaning up a series of cyberattacks on fictional island

The Register

If you read the cybersecurity sections of the 2026 NDAA closely, you can almost hear a weary sigh. This is not the sound of bold futurism. This is the sound of an institution that just finished grading a stack of exams and realized half the class still doesn’t lock their phone.

After a year of SignalGate and other painfully avoidable security lapses, Congress has decided to do something radical: write laws that assume people will make bad decisions unless gently, repeatedly, and legally discouraged from doing so. Hence, there is a new focus on hardened mobile devices for senior officials and actual rules around AI security. Not vibes. Rules. And it's long overdue.

The subtext is refreshingly honest. Cybersecurity failures this year weren’t caused by zero-days or shadowy genius hackers. They were caused by convenience, overconfidence, and the timeless belief that “it’ll probably be fine.” The NDAA reads like a syllabus revision after the midterm went badly.

There’s a lesson here for the rest of us. You can buy the best tools, fund the smartest teams, and write the cleanest policies. But if leadership treats security like optional homework, the final grade will reflect that.

TL;DR
🧠 Cyber law reacts to real-world faceplants
⚡ Mobile and AI security get adult supervision
🎓 Leadership behavior becomes part of the threat model
🔍 Secure tools don’t cancel careless habits

https://www.csoonline.com/article/4103754/key-cybersecurity-takeaways-from-the-2026-ndaa.html

#Cybersecurity #NDAA2026 #Leadership #RiskManagement #AIsecurity #CISO #security #privacy #cloud #infosec

Key cybersecurity takeaways from the 2026 NDAA

A 4.1% increase in military cyber funding in the FY2026 NDAA budget underpins new requirements for hardened mobile devices, AI security frameworks, and expanded DoD cyber workforce authorities.

CSO Online

In tech, where you host is almost as important as what you build. Proton, long synonymous with Swiss privacy protection, has begun relocating parts of its physical infrastructure out of Switzerland in response to proposed changes to the country’s surveillance law. This is a strategic hedge against legal uncertainty that could require VPNs and encrypted services to log and retain user data, undermining core privacy commitments.

🧠 The first service to shift is Lumo, Proton’s privacy-first AI chatbot, now hosted in Germany.
⚡ Proton insists this investment in Europe doesn’t mean abandoning Switzerland.
🎓 The move highlights how evolving regulatory landscapes can ripple through tech ecosystems.
🔍 And it raises a bigger question: when privacy laws tighten, where does a privacy company build trust?

https://www.techradar.com/vpn/vpn-privacy-security/is-proton-leaving-switzerland-legal-uncertainty-of-proposed-surveillance-laws-is-pushing-them-to-make-several-changes

#Privacy #Cybersecurity #TechPolicy #Proton #security #privacy #cloud #infosec #cybersecurity

Is Proton leaving Switzerland? "Legal uncertainty" of proposed surveillance laws is pushing them to make several changes

Several of Proton's products could be headed elsewhere in Europe in the wake of proposed surveillance laws

TechRadar
In 2–3 years, distinguishing what’s real from what’s AI-generated may be nearly impossible. This isn’t just a technology problem—it’s a leadership and policy challenge, and I’m not convinced our leaders or institutions are moving fast enough. 😳
Working from the 95th floor of the Sears Tower today 🌬️ The wind is no joke—the building is noticeably swaying, and a few folks are really feeling it 🤢 Nature reminding us who’s really in charge.
🌟 As this year comes to a close, I want to take a moment to wish you a joyful holiday season and a wonderful start to the year ahead. I look forward to an incredible year with you in 2026. ⛷️🕎🎄❄️☃️🎇

Imagine inventing the future of AI hardware only to have your own government take a quarter of your China sales as part of policy. That’s exactly what’s happening with the U.S. decision to let Nvidia export its H200 AI chips to China with a 25% revenue share flowing back to Washington. 😳 The move was pitched as a way to balance economic engagement with strategic control, but many experts and security hands are baffled, calling the cut essentially an export tax that “makes no sense” given China’s AI ambitions. The critics warn this could erode U.S. leverage in the AI race by giving China broader access to powerful computing while letting Beijing tap into American tech ecosystems without paying full strategic cost. Even bipartisan lawmakers have pressed Nvidia’s CEO to testify on how this deal came together and what it means for national security.

TL;DR
🧠 policy turns chip exports into a revenue play
⚡ experts question strategic logic
🎓 national security & market leadership on the line
🔍 Congress is watching closely

https://arstechnica.com/tech-policy/2025/12/us-taking-25-cut-of-nvidia-chip-sales-makes-no-sense-experts-say/#comments

#AIChips #USChinaTech #NationalSecurity #InnovationEconomics #CyberWar #Espionage #security #privacy #cloud #infosec #cybersecurity

US taking 25% cut of Nvidia chip sales “makes no sense,” experts say

Trump’s odd Nvidia reversal may open the door for China to demand Blackwell access.

Ars Technica
Wrapstodon 2025 for Brian Greenberg :verified:

See how Brian Greenberg :verified: used Mastodon this year!

Infosec Exchange