Skip to main content
How to AI
To:Brew Readers
IT Brew // Morning Brew // Update
Step one: remain calm about job losses and vibe coding.

Voilà, it’s Wednesday! Today is National Awkward Moments Day, and thus the best day to forget to take yourself off mute while talking on Zoom.

In today’s edition:

Protect and AI-dapt

Third is the word

A line in the sand(box)

—Nick Kolakowski, Caroline Nihill

SOFTWARE

A portrait of Christopher Mims, tech columnist for The Wall Street Journal

Christopher Mims

As AI tools become more sophisticated, IT professionals find themselves speared on the horns of a dilemma: AI might make them more productive…but it also might automate them right out of a job.

IT Brew sat down with Christopher Mims, tech columnist for the Wall Street Journal, to discuss his new book, How to AI, which delves into the evolution of AI and how it has impacted the modern workplace.

Mims seeds the book with practical “laws” for AI, including “AI is a feature, not a product,” and “Don’t trust it, and always verify its work.”

While his examples of AI integration often focus on people in non-technical roles, much of his advice applies just as effectively to sysadmins, developers, and others busy figuring out how the technology can improve their workflows.

How Mims thinks you can future-proof your career.—NK

Presented By BetterCloud

CYBERSECURITY

Cosourcing talent deloitte

Nuthawut Somsuk/Getty Images

Where does the cybersecurity buck stop? Some experts point to third- or even fourth-party vendor plugins as a possible culprit for gaps in organizational security.

Those seeking to eliminate vulnerabilities in their cybersecurity infrastructure may want to seek assurance that the plug-ins provided by outside vendors are mitigating risk appropriately. This includes “fourth-party” vendors that provide data and tools used by subcontractors and others.

Erik Bloch, VP of security at Illumio, told IT Brew that “everybody’s leveraging third parties today” for critical data, but not everyone has visibility into what those vendors are doing.

“We’re seeing more and more of this where [attackers are] going after third parties,” Bloch said. “They don’t have to go after you if they know your data is stored somewhere else, right?”

How to mitigate these risks.—CN

CYBERSECURITY

Auditors GENAI I

Yuichiro Chino/Getty Images

Like parents on the playground, IT pros handling AI have a crucial decision to make: Is it time to remove this little one from the sandbox?

In the case of IT, this means AI models that are not yet trusted to access different parts of the network, which may hold sensitive data, so they’re isolated in a secure testing environment.

Leveraging AI without putting the company in a vulnerable position means putting guardrails into place. That’s why it’s necessary to have a sandbox for network and staging development, Ledger’s CTO Charles Guillemet told IT Brew. Running a security evaluation before deployment is always a good idea for professionals who want to leverage AI to its fullest extent.

“AI [tools] are not deterministic, and there are different studies that prove that AI could do the opposite of what you [wanted] under certain circumstances, so definitely you can’t really trust an AI,” Guillemet said. “If you implement an AI, give it access to sensitive data, but also to the internet and so on…you would expect the AI to keep this data confidential. There is no way to ensure this and to enforce this, so you need to create the conditions that will prevent the AI [from doing] that.”

Why segmentation is key.CN

Together With Tines

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes

Francis Scialabba

Today’s top IT reads.

Stat: 1+ million. That’s how many Nvidia GPUs Amazon Web Services plans to deploy in its global cloud regions in the next year. (Data Center Dynamics)

Quote: “This is not a mental health crisis caused by hackers; it is a leadership design flaw.”—Russ Kirby, Ping Identity CISO, on the CSO burnout crisis in the industry (CSO Online)

Read: Are orbital data centers just around the corner? Depends on who you ask. (Futurism)

AI in the driver’s seat: As Gemini accelerates in Google Drive, IT leaders navigate new security concerns. Join BetterCloud on April 16 as their governance leaders share firsthand insights from the field. RSVP here.*

*A message from our sponsor.

Three server racks covered in glowing binary code

Illustration: Amelia Kinsinger, Photos: Adobe Stock

AI and cloud computing are adding new complexity to virtual environments. Here’s how emerging workloads, containerization, and automation are changing infrastructure expectations for IT teams.

Read now

SHARE THE BREW

Share the Brew

Share the Brew, watch your referral count climb, and unlock brag-worthy swag.

Your friends get smarter. You get rewarded. Win-win.

Your referral count: 5

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2026 Morning Brew Inc. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.

By subscribing, you accept our Terms & Privacy Policy.

A mobile phone scrolling a newsletter issue of IT Brew