Skip to main content
Robert Red-teaming
To:Brew Readers
IT Brew // Morning Brew // Update
A former federal agent watches the ’90s techno thriller with us.

Lock in for Thursday! Feeling enterprising? So are the biggest AI companies, which are trying to seize enterprise business as fast as possible.

In today’s edition:

IT Brew movie club

Terr-AI-pin station

On the edge

—Billy Hurley, Eoin Higgins

CYBERSECURITY

Credit: Illustration: Morning Brew Design, Photos: Sunset Boulevard/Getty Images, Universal Pictures

Credit: Illustration: Morning Brew Design, Photos: Sunset Boulevard/Getty Images, Universal Pictures

It’s pen-testing, ’90s-style—and it’s more exciting than you might think.

The techno-thriller film Sneakers (1992) follows a crew of experts who are paid by companies to test their physical security and cyber defenses—something familiar to pretty much everyone today, even if the concepts might have seemed alien to the audience at the time.

The team (which includes Robert Redford, Ben Kingsley, Sidney Poitier, Dan Aykroyd, River Phoenix, David Strathairn, and Mary McDonnell) is pressured by federal agents (or perhaps fake federal agents?) into stealing a device common to any action movie: a mysterious black box. And this box, it turns out, breaks the encryption protecting the power grid, federal reserve, and seemingly every other piece of important infrastructure in the US.

In this installment of IT Brew Movie Club, we talk to Trevor Hilligoss, chief intelligence officer at cybersecurity company SpyCloud and former federal agent and FBI task force officer, about scenes in Sneakers that still hold up more than 30 years later.

Sneak along.—BH

Presented By The Crew

IT OPERATIONS

LG electronics screen on a street.

LG

LG screens are everywhere. The South Korea-based company’s displays are an integral part of modern life, appearing in public spaces, around corporate offices, and in the home.

Tom Bingham, LG Electronics’s director of vertical market sales, told IT Brew that developing the technology requires integrating software and hardware—and AI. More reactive screens require complex interactions and data analytics to provide close to real-time responses.

“The biggest thing that people are trying to work on now is making sure that they’re actually able to apply AI into the analytics around the data, ingest that data in real time, and then make decisions,” Bingham said.

How to get responsible.—EH

Do you use physical security keys to secure your systems, or are other access controls still your top choice?

YubiKeys and other physical security keys are a staple
2FA is good enough without physical keys

IT OPERATIONS

Aerial view of trucks unloading trash into a landfill

Allen J. Schaben/Getty Images

A new directive from the federal government’s top cybersecurity agency aims to lessen the danger presented by end-of-support edge devices—something that would close the gap for hardware security.

The Cybersecurity and Infrastructure Security Agency (CISA) issued a Binding Operational Directive to reduce the risk from edge devices that have overstayed their security welcome but may still be in use.

CISA’s guidance directs federal agencies and departments to inventory and decommission said devices, allowing government IT desks to do so on a rolling basis before replacing them. The 24-month plan features benchmarks that the agency hopes will change how the federal government manages IT hardware.

It’s all part of the plan.—EH

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes

Francis Scialabba

Today’s top IT reads.

Stat: 207%. That’s the jump in GenAI app installs YoY in India, showing the market for the technology is increasing in the world’s fourth-largest economy. (TechCrunch)

Quote: “There’s always a story to tell about the evolving nature of what Google thinks is important based on whatever analysis they have about when they disclose information.”—Megan Graham, director of the Technology Law Clinic at the University of Iowa, on how the tech behemoth handles government subpoenas (Wired)

Read: How large and small tech companies alike are enforcing AI usage for employees. (the Wall Street Journal)

Together With Starburst

SHARE THE BREW

Share the Brew

Share the Brew, watch your referral count climb, and unlock brag-worthy swag.

Your friends get smarter. You get rewarded. Win-win.

Your referral count: 5

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2026 Morning Brew Inc. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.

A mobile phone scrolling a newsletter issue of IT Brew