Skip to main content
Going electric
To:Brew Readers
IT Brew // Morning Brew // Update
Volt Typhoon amps up the danger.
February 15, 2024 View Online | Sign Up

IT Brew

And then—Thursday! Any plans for the holiday weekend? We’re thinking about going for a hike or a run…or maybe just sitting around the house playing Prince of Persia: The Lost Crown.

In today’s edition:

Hacking comes home

Private practice

Yard work

—Amanda Florian, Billy Hurley, Eoin Higgins, Patrick Lucas Austin

CYBERSECURITY

The FBI’s watching China watch you

Power grid with the sky in the background. Peterschreiber.Media/Getty Images

In January, the FBI shut down a botnet of hundreds of home and office routers that Chinese cyber criminals were using to obfuscate their hacking of critical infrastructure in the US. Volt Typhoon has compromised critical infrastructure within communications, transportation, water, energy, and other sectors, US agencies confirmed in a cybersecurity advisory published last week.

Volt Typhoon not only exploits known or zero-day vulnerabilities in routers but also in firewalls and VPNs. They then connect to a victim’s network using a VPN to further their schemes, according to the Cybersecurity and Infrastructure Security Agency (CISA).

Whether you’re working remotely or in the office, there are a few key steps you can take to mitigate the reach of Volt Typhoon and other hacking groups mining for US data.

IT Brew caught up with Mike Bimonte, who serves as the CTO for state, local, and education (SLED) government sectors at cybersecurity company Armis, to chat cyber risk patterns and staying safe.

Read more here.—AF

Do you work in IT or have information about your IT department you want to share? Email [email protected].

   

FROM THE CREW

Your B2Biz our audience

The Crew

Morning Brew’s unique community of young, hard-to-reach readers (that’s 22m+ monthly readers who are 1.7x more likely to have a household income of $150k+, to be exact) can give your B2B offerings the visibility you’re looking for.

B2B decision-makers, it’s crucial to get your business’s potential in front of the right s. That’s why the Brew’s paid advertising opportunities connect your brand to our audience by leveraging our popular B2B-centric franchise newsletters, specialized events, and skyrocketing collection of multimedia content.

Morning Brew is powered by the knowledge you need. From Marketing Brew’s trending insights to CFO Brew’s timely updates, we’ve got a B2B Brew for you. Choose yours to grow with.

IT OPERATIONS

I hear the training a-comin’

a cardboard box labeled "personal information" with little slips of info going into it, such as "likes cats more than dogs" Francis Scialabba

In a real “ask the large language model to build the plane while flying” kind of situation, today’s data privacy professionals have the tough task of embracing generative AI ideas while teaching employees how to run with them securely. Privacy officers like Intuit’s Elise Houlik instruct a company on how to use large language models (LLMs) while protecting sensitive data like source code or personally identifiable information.

After December’s live IT Brew event, “A Delicate Balance: Tech Innovation and Privacy,” an attendee had the following question for guest Elise Houlik, chief privacy officer at the fintech platform:

“How do you approach privacy training when technology emerges so quickly and potentially makes that training obsolete? Can training be quantified as a hit on company ROI?”

We posed the question to Houlik and separately, to other data-privacy pros this month.

These responses have been edited for length and clarity.

Houlik: If I’m building a new ecosystem, where the concepts of how to appropriately use and handle personal information are essential to navigating the web of new technology coming around, to me, training is essential: How do you get your ecosystem to know and understand the guardrails between the right and wrong ways to use data?

Read more here.—BH

Do you work in IT or have information about your IT department you want to share? Email [email protected].

   

CYBERSECURITY

Going yard

Web of connections overlaid over home appliances Hakule/Getty Images

Automated devices are popping up all over, inside and outside the home—and the connectivity they require for updates, instructions, and programming could open the door for threat actors.

At tech showcase CES in January, autonomous internet-of-things (IOT) startups were on the floor showing off their products.

Consumer interest. Ensuring IoT devices are safe and secure is important to users, Rapid7 Principal Security Researcher Deral Heiland told IT Brew, because if it can be hacked, it will be. Consumers are becoming more security aware and are going to be looking out to ensure the companies whose products they buy have their interests in mind.

“We need the vendors to step up and start thinking about, ‘Hey, I’m starting to see more awareness in our consumers from security, privacy, how my data is being handled,’” Heiland said. “I think it’s to their advantage that they make a statement on that and make that data available.”

One of the main threats from hackers attacking connected IoT devices is that they could be used to access vulnerable home networks. Heiland told IT Brew that while it’s a danger, it’s one that carries a risk-reward calculation for the average attacker that doesn’t necessarily line up.

Keep reading here.—EH

Do you work in IT or have information about your IT department you want to share? Email [email protected].

   

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes Francis Scialabba

Today’s top IT reads.

Stat: 63%. That’s how many apps have vulnerabilities in first-party code, according to a Veracode report. (Decipher)

Quote: “Is this a real question? These notions are preposterous.”—Leon Serfaty, a WSJ reader, on whether it’s ever okay to be mean to a chatbot (the Wall Street Journal)

Read: An interview with tech journalist Kara Swisher on what she’s learned over her decades covering the industry. (Wired)

JOBS

Forget generic job searches. CollabWORK leverages the power of community to connect you with relevant opportunities in Slack channels, Discord servers, and newsletters like IT Brew. Land your dream job through the power of your network with CollabWORK.

SHARE THE BREW

Share IT Brew with your coworkers, acquire free Brew swag, and then make new friends as a result of your fresh Brew swag.

We’re saying we’ll give you free stuff and more friends if you share a link. One link.

Your referral count: 2

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2024 Morning Brew. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.

A mobile phone scrolling a newsletter issue of IT Brew