Skip to main content
Sorry, can you repeat that?
To:Brew Readers
IT Brew // Morning Brew // Update
How 4 CISOs make security stick.

It’s Monday! The Oscars are over, and now we move from good actors to threat actors. May you shine in your supporting IT role, and may your work life be less messy than The Substance.

In today’s edition:

That’s en-ter-train-ment!

API campers

Feeling kinda auth lately

—Brianna Monsanto, Eoin Higgins, Billy Hurley, Patrick Lucas Austin

CYBERSECURITY

Illustration of colorful head silhouettes in a circle formation.

Drafter123/Getty Images

Gamification, memorable catchphrases, and inside jokes, these are just a few ways security professionals are making cybersecurity education a little more palatable in their organizations.

According to a 2024 Proofpoint report, computer-based training remains the most popular format for cybersecurity education within organizations (45%), followed by newsletters and emails (38%), as well as in-person training sessions (37%).

However, some security professionals, like LinkedIn CISO Lea Kissner, told IT Brew that traditional approaches to security awareness education have not always been the most enticing.

“There are a lot of trainings that I’ve had to take in the past where they…made my eyes glaze over, even as a security person who loves this stuff,” Kissner said.

IT Brew caught up with four security professionals on how they provide meaningful cybersecurity training and education to employees.

​​The comments below have been edited for length and clarity.

Alissa Abdullah, deputy chief security officer at Mastercard: We create videos that are very short and that are catchy. Our catchphrase that we have here at Mastercard is, “I don’t know you like that.” So, when you look at an email and it could be a phishing email, what’s the catchphrase? I don’t know you like that.

We also have spear phishing tournaments, where if you click on a spear-phishing report, a spear-phishing email, you’re put into a lottery with prizes and things like that. So, we do gamify it as well. We have a security score. Everybody in the company gets a security score, and there is a lot of trash talking and street cred across teams and across executives on what their security score is.

Read the rest here.BM

Presented By YeshID

CYBERSECURITY

Computer with mouse arrows on a square grid

Francis Scialabba

First, the good news: The AI revolution is still underway The bad news? Security might be falling by the wayside.

That’s one of the concerns around DeepSeek, the Chinese OpenAI alternative that exploded onto the global scene in January, erasing $1 trillion in technology stocks due to its cost-effectiveness compared to its competitors. It’s not all bad—the new large language model could provide a new way of deploying the technology due to its lower cost. Potential benefits aside, there are questions about how safe it is and how it might introduce vulnerabilities to the overall AI landscape.

Nerve center. For Chuck Herrin, field CISO at application security provider F5, those threats include dangers to application programming interface (API) frameworks across the industry. When the “hype cycle” of AI began in earnest, Herrin said, most APIs weren’t “under control”—meaning that once attackers were able to deploy powerful AI automation, defenders were already on the back foot.

“The rush to ‘AI all the things’ is just exacerbating that attack surface even more with new types of attacks we need to worry about,” Herrin said.

Read more here.EH

CYBERSECURITY

Binary code being enlarged by a digital magnifying display.

Emily Parsons

Google revealed to Forbes this week that it’s moving away from six-digit codes to QR codes, when verifying new email account holders.

The transition by the popular email provider targets phishers preying on cell carriers, and text messages sent via short message service (SMS) technology.

“If a fraudster can easily trick a carrier into getting hold of someone’s phone number…any security value of SMS goes away,” Google Workspace spokesperson Ross Richendrfer told Forbes in February.

QR correct, sir! Richendrfer told the publication that the company will take the next few months to “reimagine” phone number verification and consider QR codes, displayed on the non-mobile device, as authentication mechanisms.

Currently, when a new Gmail account is created, Google verifies a person’s phone number by sending an SMS text message.

There are security limitations with this option: The verification codes can be accidentally shared with the phisher, through false sites and social engineering.

Keep reading here.BH

Together With Gartner

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes

Francis Scialabba

Today’s top IT reads.

Stat: That’s the percentage of people who reported improved mental health after going without mobile internet for two weeks, according to a new study. (ZDNet)

Quote: “Could it be that in 10–20 years, it’s a four-day workweek? I think the prospects of that are very, very high.”—Anil Gupta, a professor at the University of Maryland’s Smith School of Business, imagining how the corporate world might respond to efficiencies from AI (CNN)

Read: There are more than 50 engineers and technicians onboard the Léon Thévenin—a ship cruising the oceans around Africa, repairing undersea cables and keeping the continent online. (BBC)

Who goes there? YeshID provides IAM tools that enhance the ones your SMB already has with pivotal automation and security features. Built for Google Workspace, get a demo to see how it works.*

*A message from our sponsor.

SHARE THE BREW

Share IT Brew with your coworkers, acquire free Brew swag, and then make new friends as a result of your fresh Brew swag.

We’re saying we’ll give you free stuff and more friends if you share a link. One link.

Your referral count: 2

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2025 Morning Brew Inc. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.