Skip to main content
Speak up!
To:Brew Readers
IT Brew // Morning Brew // Update
How a CISO can make the most of their time with the board and senior executives.

Thursday! You can’t teach an old dog new tricks, but maybe you can teach an old federal agency: The FDA is looking into implementing the technology over tens of workflow systems.

In today’s edition:

Is this thing on?

Blockbuster hacks

On task

—Billy Hurley, Eoin Higgins, Caroline Nihill

CYBERSECURITY

empty board meeting in office

Getty Images

Since 2023, the SEC has required public companies to explain how their boards oversee cybersecurity risk.

That means CISOs are getting some minutes in the boardroom to explain their company’s security posture to stakeholders. But standing in front of the class doesn’t mean everyone’s ready to pass the test: a recent report suggested those stakeholders aren’t understanding the cyber threat impact.

The 2026 Benchmark Report, released on Mar. 3 by cybersecurity insights group IANS Research and exec-recruitment firm Artico Search, reviewed responses from 17 board directors.

  • They are getting together. An additional survey by the organization found that 95% of CISOs (out of 653 polled) provide regular updates to the board, with 60% engaging with the full group and just over one-third interacting with a board committee. About three in four (72%) of CISOs meet a committee quarterly.
  • But the time is short. Just over half (51%) of CISOs meeting quarterly reported having between 15 to 30 minutes to speak. One in four of those meeting quarterly said they had fewer than 15 minutes.
  • And something’s off. Only 30% of boards described the relationship with their CISO as “strong and collaborative.” Slightly more than half of the board respondents (53%) said reporting on the impact of evolving threats needs improvement.

How CISOs can speak up when it matters.—BH

Presented By Level Access

CYBERSECURITY

Morning Brew Design, Photo: Universal Pictures

Morning Brew Design, Photo: Universal Pictures

At one point in the 2015 cyber thriller Blackhat, hacker Nicholas Hathaway (Chris Hemsworth) examines the malware on a USB drive. The camera lingers on Hathaway’s screen for a few extra seconds to let us know he is typing real commands like cat and autorun.inf.

The movie follows Hathaway as he tries to find the cyber-villain responsible for melting down a Hong Kong nuclear plant and disrupting the Chicago Mercantile Exchange.

In an interview with Variety eight years after the movie’s release, director Michael Mann said: “The subject may have been ahead of the curve, because there were a number of people who thought this was all fantasy. Wrong. Everything is stone-cold accurate.”

To that end, Blackhat features its share of autoruns, remote access Trojans (RATs), IP addresses, malicious payloads, and other only-in-IT terms that a cyber defense pro like Paul Taylor, associate director at cybersecurity company NCC Group, deals with day to day. Taylor currently conducts cyberattack simulations for banks.

What does Michael Mann’s thriller get right?—BH

CYBERSECURITY

System hacked warning alert on notebook (Laptop). Cyber attack on computer network, Virus, Spyware, Malware or Malicious software. Cyber security and cybercrime. Compromised information internet.

Getty Images

What are they thinking?

When it comes to ransomware criminals, the answers can vary. Some organizations are sophisticated businesses where hackers are treated as employees with HR departments and paid time-off, while others are more ramshackle.

But they’re all dangerous—and after your data. Mike Puglia, general manager of cybersecurity labs at Kaseya, told IT Brew that financial motivation has been the constant motive of ransomware attackers. The tactics are much the same between groups: gaining access, exploiting vulnerabilities, escalating privileges, and deploying an encrypter to hold the data for payment.

“It’s Whac-a-Mole, or a game of cat and mouse, between defenders and attackers, and as soon as one hole is closed, suddenly the next wave comes,” Puglia said.

Here’s how the game is played.—EH, CN

Together With Tines

JOBS

CollabWORK connects you to the hidden job market through IT Brew and other trusted channels. Browse roles curated specifically for this community by clicking through to the job board.

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes

Francis Scialabba

Today’s top IT reads.

Stat: $1 billion. That’s the size of the now-cancelled licensing partnership between OpenAI and Disney. (Ars Technica)

Quote: “The downturn in Fortnite engagement that started in 2025 means we’re spending significantly more than we’re making, and we have to make major cuts to keep the company funded.”—Epic Games CEO Tim Sweeney on why his company, which produces the Fortnite video game, is laying off 1,000 workers (TechCrunch)

Read: Shishir Mehrotra, CEO of Superhuman (formerly known as Grammarly), sat down with The Verge’s Nilay Patel to discuss how the company used Patel’s name in an AI product without permission. (The Verge)

SHARE THE BREW

Share the Brew

Share the Brew, watch your referral count climb, and unlock brag-worthy swag.

Your friends get smarter. You get rewarded. Win-win.

Your referral count: 5

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2026 Morning Brew Inc. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.

By subscribing, you accept our Terms & Privacy Policy.

A mobile phone scrolling a newsletter issue of IT Brew