Is this email difficult to read? View it in a web browser. ›

The Wall Street Journal ProThe Wall Street Journal Pro

CybersecurityCybersecurity

Sponsored by Zscaler logo.

Some Firms Say the Risks of Public AI Models Are Worth It

By Kim S. Nash

 

Hello. Capital One, ServiceNow, CrowdStrike and other companies say open artificial intelligence models are playing a crucial role in their overall AI plans. They appreciate open-model strengths, such as customizability and lower cost, even as they grapple with security challenges. 

“At the end of the day,” CrowdStrike Chief Technology Officer Elia Zaitsev said, closed models are “general purpose and very effective, but they are not customizable to specific use cases or niche domains.” Read the full CIO Journal story. 

Also today: 

  • Japan authorizes aggressive pursuit of hackers
  • Stryker hack postpones some patient surgeries
  • CISA, Microsoft urge businesses to harden endpoint security after Stryker attack
  • U.K. harmonizes cyber rules
  • Consumer cyber company Aura discloses breach
  • And more

 

 

‏‏‎ ‎

CONTENT FROM: ZSCALER
From Blocking to Securing AI: CISO Priorities for 2026

Legacy security can’t keep up with AI’s rapid evolution and modern threats. In 2026, CISOs must shift from blocking tools to securing AI use. Zscaler’s AI security platform, powered by Zero Trust, provides the visibility control and protection needed to stop risks, prevent malware, and enable GenAI adoption—without slowing innovation. Secure AI now!

Act Fast. Stay Secure.

 

More Cyber News

PHOTO: KIRSTY WIGGLESWORTH/AP

U.K. streamlines cyber regulations. Companies that must report cyberattacks can now use one portal and a single definition of an incident to report details to the Financial Conduct Authority, Prudential Regulation Authority and the Bank of England, the regulators said Wednesday. 

  • Firms would report most incidents within 24 hours of determining it meets certain thresholds for consumer harm, market stability or safety and soundness for the organization.
  • A final report is due within 30 working days of resolving the incident. 

Japan will allow its police and self-defense forces to conduct cyber operations against hackers starting Oct. 1, becoming the latest country to adopt a more aggressive stance in pursuit of cybersecurity adversaries. The U.S. and Germany recently have disclosed similar proactive plans. (The Register)

The Stryker lesson: Businesses should step up cyber protections for endpoint devices in the wake of a cyberattack at medical tech company Stryker, the top U.S. cyber agency said Wednesday. 

  • Malicious activity discovered March 11 at Stryker abused legitimate endpoint management software, the Cybersecurity and Infrastructure Security Agency warned.
  • One key step: Use phishing-resistant multifactor authentication, CISA said, pointing to resources from Microsoft for hardening its Intune endpoint management tool. 
  • Microsoft issued similar guidance for securing Intune three days after the Stryker hack. 

Stryker said some patients have had to delay surgeries because of continuing outages to its manufacturing, ordering and fulfillment systems. (Bloomberg)

Consumer cybersecurity provider Aura said a voice phishing attack led to a compromise of contact information for fewer than 35,000 current and former customers. An employee's account was accessed for about one hour, the company said. Sensitive information such as Social Security numbers, financial transactions and credentials, is encrypted and wasn't exposed, Aura said.

  • Hacking group ShinyHunters claimed responsibility for the attack, Bleeping Computer reported.

The FBI has resumed buying commercial data about U.S. residents, including location information, to help investigations. “We do purchase commercially available information that is consistent with the Constitution and the laws under the Electronic Communications Privacy Act, and it has led to some valuable intelligence for us,” Kash Patel, director of the Federal Bureau of Investigation, testified at a Senate hearing Wednesday. (TechCrunch)

  • Sen. Ron Wyden (D., Ore.) called the practice a violation of the Fourth Amendment, which protects against searches without a warrant. 

General Electric is recalling a web-based radiology workstation because of a vulnerability that exposes login credentials, which could let unauthorized users manipulate data. Clinicians use GE Medical's Centricity Universal Viewer to assess patient images. About 1,568 units are affected globally, the Food and Drug Administration said. (Radiology Business)

72

Number of nation-state, criminal and hacktivist cyber groups that targeted the U.S. food and agriculture sector last year, according to research from the industry's information sharing and analysis center. More than 59% of reported attacks in 2025 came from Russia, the Food and Ag ISAC said. 

That's followed by China at 25%, North Korea at 7%, Iran at 5% and the U.K. at 3%. 

 

About Us

The WSJ Pro Cybersecurity team is Deputy Bureau Chief Kim S. Nash and reporters Angus Loten and James Rundle. Follow us on X @WSJCyber. Reach the team by replying to any newsletter you receive or by emailing Kim at kim.nash@wsj.com.

 
Share this email with a friend.
Forward ›
Forwarded this email by a friend?
Sign Up Here ›
 
Desktop, tablet and mobile. Desktop, tablet and mobile.
Access WSJ‌.com and our mobile apps. Subscribe
Apple app store icon. Google app store icon.
Unsubscribe   |    Newsletters & Alerts   |    Contact Us   |    Privacy Notice   |    Cookie Notice
Dow Jones & Company, Inc. 4300 U.S. Ro‌ute 1 No‌rth Monm‌outh Junc‌tion, N‌J 088‌52
You are currently subscribed as [email address suppressed]. For further assistance, please contact Customer Service at pro‌newsletter@dowjones.com or 1-87‌7-975-6246.
Copyright 2026 Dow Jones & Company, Inc.   |   All Rights Reserved.
Unsubscribe