Skip to main content
When it comes to cybersecurity, a good impression is worth its weight in gold.
To:Brew Readers
IT Brew // Morning Brew // Update
As you’re facing down attackers in cyberspace, it’s good to have a reputation.
Advertisement

Good morning! If it feels like the attack surface keeps expanding…it is. From AI to vendors to “one quick integration,” the risk pile grows. Let’s talk about what actually matters and what’s just cybersecurity doomscrolling. Register now.

In today’s edition:

Impress me much

Watch closely

Hack attack

—Brianna Monsanto, Caroline Nihill

CYBERSECURITY

A portrait of Scott Beale, CEO of ICS2, a non-profit organization which specializes in training and professional certifications for cybersecurity professionals

Scott Beale

And if you don’t know, now you know.

At least, that’s what new ISC2 CEO Scott Beale hopes to achieve with the cybersecurity certification organization’s members, who he said are largely unaware of the impact ISC2 has on the broader industry.

“ISC2 has been doing a lot of work around advocacy, working with national and state governments in the US and around the world to make sure that laws are being passed in a way that is informed by cybersecurity workers,” Beale said. “It is an incredible benefit to the world. It also benefits members, benefits governments and nonprofits, but it is not something that people even really know a lot about.”

Make your mark.BM

Presented By Snapdragon

CYBERSECURITY

A patchwork of web browsers forming one image of a padlock for cybersecurity

Amelia Kinsinger

Check your blind spots…and we aren’t talking about the ones in your car.

Old vulnerabilities continue to create new dangers for organizations as cybercriminals exploit code that’s never been fixed. That’s according to a recent TrendAI report, which found 70% of requested exploits between January 2023 and January 2026 leveraged vulnerabilities that were more than two years old. About 8% were for vulnerabilities between 10 and 15 years old.

The AI twist. There’s nothing novel about cybercriminals eyeing dated vulnerabilities. This January, for example, CISA added a 17-year-old PowerPoint bug to its list of actively exploited common vulnerabilities and exposures (CVEs).

Keep an eye out.BM

CYBERSECURITY

WTW Geopolitical Risk Prep

Emily Parsons

Following significant cyberattacks linked to a hacking group thought to be linked to Iran, experts are highlighting how securing systems against credential-based hacks is critical.

In the beginning of March, Handala Hack, also known as Handala, claimed responsibility for a cyberattack on medical services and devices provider Stryker. Reuters reported that the company experienced disruptions and limited access to systems as a result of the attack; Healthcare Brew reported that 56,000 global employees were encouraged to disable company-issued devices and keep them off of networks.

Amy Mushahwar, data privacy, security, safety, and risk management team chair at law firm Lowenstein Sandler, told IT Brew that the Stryker attack “could happen to any critical company in the US.” The attack itself, she added, was unique in that the attackers destroyed data permanently rather than holding it for ransom. ProArch shared that, in some departments at Stryker, up to 95% of devices had been erased before defenders reacted. Attackers also reportedly defaced login screens with Handala’s logo and propaganda.

“Iranian nation state actors are normally pretty smash and grab…I think the novelty of the wiper attack here is pretty interesting,” Mushahwar said. “This was a deliberate disabling of an entire set of company end points.”

Breaking in.CN

Together With Eaton

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes

Francis Scialabba

Today’s top IT reads.

Stat: $30 million. That’s how much the toilet on Artemis II cost—and it’s still facing problems on the lunar flight. (Futurism)

Quote: “Big Tech should pay for everything.”—Greg Landsman, a Democratic congressman in Ohio, on the responsibilities of Silicon Valley giants building data centers in rural communities (the Wall Street Journal)

Read: Anthropic is starting a new group, Project Glasswing, with Google, Microsoft, Apple, and more, to handle cybersecurity related to new, powerful AI models. (Wired)

Smart deployment: Insight deployed devices powered by Snapdragon across its global workforce. The rollout applied to 10 European countries, and was so smooth it required minimal IT support and no additional employee training. Learn more here.*

*A message from our sponsor.

SHARE THE BREW

Share the Brew

Share the Brew, watch your referral count climb, and unlock brag-worthy swag.

Your friends get smarter. You get rewarded. Win-win.

Your referral count: 5

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2026 Morning Brew Inc. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.

By subscribing, you accept our Terms & Privacy Policy.

A mobile phone scrolling a newsletter issue of IT Brew