Skip to main content
I love the Stepping Stones
To:Brew Readers
IT Brew // Morning Brew // Update
Their first album is really underrated!

Monday has arrived! We’re glad to hear you’ve gone grillin’, fled fireworks, and pounded some pop poolside. Now back to your regularly scheduled laptop loathing. Summer, right?

In today’s edition:

🪨 Step this way

Big business

Deepfake, USA

—Billy Hurley, Eoin Higgins, Tom McKay, Patrick Lucas Austin

CYBERSECURITY

Peter Cade/Getty Images

Peter Cade/Getty Images

Sure, being an adversary-emulating red teamer sounds thrilling when you’re hired to phish a CFO and sneakily bypass a company’s security defenses, but nobody ever talks about all the paperwork.

Red teams frequently have to document the many steps of their path inside a company–and then present those notes to blue-team defenders for review. A “Stepping Stones” logging tool from NCC Group, released in June 2024, aims to help organize the infiltration.

“It helps with that retrospective tracking for the blue team, because all of the events are logged at a specific time against a specific machine. So the blue team knows where to go and hunt for any logs that might have been missed,” Stephen Tomkinson, principal security consultant at NCC Group, told IT Brew.

As a member of NCC Group’s Full Spectrum Attack Simulation (FSAS) team, Tomkinson often infiltrates the IT systems of big companies, including those in the financial sector. An exercise may feature a red team phishing their way into one laptop, which then potentially leads to access to additional company systems, or leads to the testers installing the adversary-simulation program Cobalt Strike, which simulates attacker tactics like recon and lateral movement.

Read the rest here.—BH

PRESENTED BY EATON

Imagine all the things that could damage your IT equipment: intense heat, electric shocks, jarring vibrations, spills, dust, debris, you name it. Even scarier? These potential dangers are all over most industrial and manufacturing environments.

That’s why you need Eaton. They offer a full suite of products and services to take your manufacturing IT up a whole lotta notches. To help you bring IT to OT, Eaton put together this super-handy infographic.

Eaton offers all kinds of solutions to a variety of industrial IT challenges, like:

  • rack cabinets and enclosures that protect against spills and debris
  • USB hubs that defend against electrostatic charges
  • DIN Rail UPS and industrial-grade cabling to heat-proof
  • wireless access point enclosures that keep Wi-Fi modems out of the way

Secure your systems.

CYBERSECURITY

Gensler warns on AI

Kilito Chan/Getty Images

When global network behemoth Cisco bought data processing company Splunk in March 2024, the two came together more like a merger than an acquisition.

That meant new job titles for some Splunk executives, like former SVP and General Manager of Security Mike Horn. Today, Horn is SVP and General Manager of Splunk Security Products at Cisco, a role that reflects his work to help ease the transition from an 8,000-strong company to one that in 2023, claimed more than 84,000 employees.

“We weren’t small,” Horn told IT Brew at Cisco Live in early June. “But Cisco has a much bigger operating environment where we can take advantage of [things like] ‘Hey, you’re making an investment in AI. Can we piggyback on that investment? We’re both doing work on ML—how can we get our teams working together so we can get an expanded set of capabilities?’”

On the lookout. Horn’s still keeping an eye on security threats. And in a sector that’s changing fast, especially with the introduction of AI on both the defender and attacker side, he said it’s important to stay on top of trends—be they new technologies or new ways of distributing attacks.

Read more here.—EH

IT STRATEGY

Two AI figures and blocks of code with an American flag in the background

Wildpixel/Getty Images

Voluntary commitments to fighting deepfakes just aren’t going to cut it, according to one of the nation’s top cybersecurity officials.

Cybersecurity and Infrastructure Security Agency (CISA) Chief Jen Easterly warned at the Washington Post’s Futurist Summit last month that generative AI is certain to “inflame” existing threats around the spread of disinformation online before the November elections. Tech firms which have promised to fight deepfakes might skirt those commitments given they are not actually obligated by law to do so, and face fewer regulations around AI development in general than they do in the European Union, Easterly added.

“I do think efforts to ensure that anybody can tell whether a video is generated with AI capabilities, whether it’s a deep fake, that is very important,” Easterly told attendees. “And so the problem is, however, there is no real teeth to these voluntary agreements.”

Keep reading here.—TM

TOGETHER WITH NOTION

Here’s to a smarter hub. Wanna save your team hours every single day? An AI-powered IT knowledge hub gives employees a better way to create and find the knowledge they need to quickly resolve issues and reduce downtime. Learn how to build, roll out, and maintain your hub here.

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes

Francis Scialabba

Today’s top IT reads.

Stat: 41 years. That’s how long it took Microsoft’s Windows Notepad to get autocorrect and spell-check features. (ZDNet)

Quote: “Multigig is already the new norm.”—Google, in a blog post announcing its testing of a new 50 gbps network technology for its GFiber internet service (PCMag)

Read: Layoffs ravaging the video game industry worldwide have largely left Japan’s gaming industry intact. Here’s why. (The Verge)

Hardware heroes: Industrial environments require industrial-grade IT hardware. To help you secure the goods, Eaton put together this super-handy infographic that has all the deets on common industrial IT challenges and their solutions. Peep it.*

*A message from our sponsor.

SHARE THE BREW

Share IT Brew with your coworkers, acquire free Brew swag, and then make new friends as a result of your fresh Brew swag.

We’re saying we’ll give you free stuff and more friends if you share a link. One link.

Your referral count: 5

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2025 Morning Brew Inc. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.

By subscribing, you accept our Terms & Privacy Policy.

A mobile phone scrolling a newsletter issue of IT Brew