Skip to main content
Document everything
To:Brew Readers
IT Brew // Morning Brew // Update
Why AI integration needs stringent documentation.

Wednesday! On this day in tech history, the first wiki software—WikiWikiWeb—was launched in 1995. The name was inspired by the “Wiki Wiki” shuttle bus that runs between the Honolulu International Airport terminals.

In today’s edition:

Just keeping track of this

Pass the word

Life’s a breach

—Tricia Crimmins, Brianna Monsanto

IT OPERATIONS

Laptops, folders, and workers to represent the interconnectedness and importance of documenting IT workflows.

Brittany Holloway-Brown, Photos: Adobe Stock

It’s a tale as old as time: A superstar IT pro has been running an entire company’s digital systems for years. She built the asset management, remote monitoring, and ticketing systems herself, and whenever anyone has a question, she’s the one to ask.

But what happens when she puts in her two weeks’ notice or announces her retirement? What if leadership requires that IT offload some of its day-to-day work to AI? How can all the human expertise be passed on to others, or partially automated?

As boomers retire en masse over the next few years and AI continues to integrate into IT workflows, situations like these will become a reality for many IT pros—for some, they already are. The solution is consistent documentation and, importantly, documenting workflows as a continuous, accessible, and centralized process.

Why IT pros aren’t documenting, here.TC

Presented By BetterCloud

IT STRATEGY

A lock disappearing in front of a scanned fingerprint.

Illustration: Anna Kim, Photo: Adobe Stock

Things Rob Gregory hates: broccoli, unkempt grass, uncomfortable chairs, and passwords…the latter so much so that he is actively working to eliminate them from his organization.

Gregory, who is CISO at cybersecurity advisory firm Optiv, told IT Brew that the password-elimination project is the second passwordless initiative in his career, and that the shift to passwordless will be a solid solution to several cybersecurity risks, including phishing attacks and data breaches.

“Passwordless is really the building block that everyone should be building their identity and access platform around today,” he said.

Gregory isn’t the only CISO sailing in the anti-password boat: More than nine in 10 CISOs either have implemented or are planning to implement passwordless authentication within their organization, according to a Portnox survey querying 200 CISOs.

No password required for this.BM

CYBERSECURITY

Headshot of Prasad Tharippala

Prasad Tharippala

It’s safe to say that Prasad Tharippala, Asia–Pacific field CISO at Versa Networks, is no stranger to security incidents, having made it through a breach and the aftermath with his career intact.

From 2017 to 2020, Tharippala ran his own cybersecurity company, helping clients navigate cyberattacks. He recalled one early case in which one of the largest textile firms in India had been attacked.

“I went there, and then I took charge of the situation where the company is being completely ransomed,” Tharippala said, adding that he helped operations resume within one and a half days.

Gather around, it’s storytime. We caught up with Tharippala to talk about when, as a CISO, he helped a global company thwart a third-party breach. (One in three breaches in 2025 involved a third party, according to a recent Verizon report.)

The only way out is through…this link.BM

Together With NRF Protect

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes

Francis Scialabba

Today’s top IT reads.

Stat: 6.8 million. That’s how many users could be affected by an alleged data breach at Crunchyroll, the popular anime streaming service. (Bleeping Computer)

Quote: “This is bad. They are way too easy to repurpose…I don’t think that can be contained anymore. So we need to expect criminals and others to start deploying this.”—Matthias Frielingsdorf, co-founder of iVerify, about an exploit kit that can seemingly hack millions of iPhones (TechCrunch)

Read: Security professionals are advised to check networks following the rise of a new hacking group, TeamPCP, that’s spreading malware. (Ars Technica)

Real talk: IT and security leaders are gathering for a no-fluff conversation about preparing Google Drive environments for AI. Hosted by BetterCloud, the fireside chat will cover solutions for governance and preparedness challenges. Register here.*

*A message from our sponsor.

What’s the five-letter word for a site consulted by hypochondriacs? If you think you know, try your hand at Volume 2 of the Morning Brew’s Book of Crosswords (this clue’s on page 42). Now with free shipping for IT Brew readers.

Order now

SHARE THE BREW

Share the Brew

Share the Brew, watch your referral count climb, and unlock brag-worthy swag.

Your friends get smarter. You get rewarded. Win-win.

Your referral count: 5

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2026 Morning Brew Inc. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.

By subscribing, you accept our Terms & Privacy Policy.

A mobile phone scrolling a newsletter issue of IT Brew