Trouble viewing this email?  View in web browser ›

The Wall Street Journal ProThe Wall Street Journal Pro

CybersecurityCybersecurity

Sponsored by NetscoutNetscout

Cybersecurity Chiefs Navigate AI Risks and Potential Rewards

By Kim S. Nash

 

Hello. Security chiefs say the benefits of artificial intelligence in general are clear but both the promises and risks of early generative AI tools, such as OpenAI's ChatGPT, are overblown.

In other words, it's not time to panic about hackers wielding ChatGPT to run away with your company's most valuable information. Nor will tacking a ChatGPT interface onto cyber tools transform your security strategy. Read more about what your cyber peers have found in early experiments.

More news below.

 

‏‏‎ ‎

CONTENT FROM OUR SPONSOR: Netscout

How to Enable the Unstoppable Enterprise

The ability to maintain an unstoppable enterprise is largely tied to the digitally transformed modern enterprise environments that keep applications running and quality end-user experience high. And, in a blink of an eye, all of these can easily come to a screeching halt if their modern digital IT environment experiences a performance or security incident.

Click Here

 

More Cyber News

PHOTO: LAUREN HURLEY/ZUMA PRESS

Debt collector hacked: Trevose, Pa.-based NCB Management Services, which collects consumer debt across the U.S. for banks, retailers, car companies and others, said the personal information of 1,087,842 people was accessed by a network intruder in February. At-risk data includes payment card details and account numbers. 

  • "NCB has obtained assurances that the unauthorized third party no longer has access to any of NCB’s data," the company said in a letter to consumers, without providing details.

Lobbying for a prisoner swap: A Russian citizen facing U.S. money-laundering charges is mounting a campaign to be included in any prisoner exchange between the two countries that could free detained Wall Street Journal reporter Evan Gershkovich. U.S. officials charged Alexander Vinnik, co-founder of a popular bitcoin exchange​, in a 21-count indictment, saying that he ran a money-laundering operation through BTC-e. They said the exchange was popular with Russian criminals and used to facilitate ransomware extortions and identity-theft schemes, as well as narcotics distribution. Vinnik has pleaded not guilty. (WSJ) 

 

We have a great line-up for our virtual conference May 31, including:

Gene Sun, global CISO at FedEx

David Reber, CSO at Nvidia

Kristy Littman, former crypto assets & cyber unit chief at the SEC

Dominique Shelton Leipzig, partner in cybersecurity & data privacy at Mayer Brown

Lynn Haaland, chief compliance, ethics and privacy officer at Zoom

And many more!

Click here to register for the WSJ Pro Cybersecurity Forum

 

Risks

Chinese hackers aim to hinder U.S. communications by compromising systems in Guam, Microsoft says. The hacking group, which Microsoft researchers said in a new report Wednesday is backed by the Chinese government, has been gathering intelligence about maritime, transportation and government systems since mid-2021 to use during a crisis between the two countries. (CNN) 

  • Read more: Microsoft's report about the "Volt Typhoon" operation.

Protect those backup files: Ransomware hackers lurk in corporate networks for weeks or months before setting off their malware. Why? Often, they look for backup systems to encrypt along with any production data and daily operations systems. According to new research from cyber company Veeam, in 93% of ransomware strikes, hackers go for backups. 

“The overall macro trends of cautious spending, deal scrutiny and cost and value consciousness persist. Moreover, the behavior continues to be more widespread across a larger swath of our customers.”

— Nikesh Arora, chairman and chief executive of Palo Alto Networks, in the cybersecurity company’s quarterly earnings call Wednesday
 
Advertisement
 

About Us

The WSJ Pro Cybersecurity team is Deputy Editor Kim S. Nash (on Twitter @knash99), reporter James Rundle and reporter Catherine Stupp (@catstupp). Follow us on Twitter @WSJCyber. Reach the team by replying to any newsletter you receive or by emailing Kim at kim.nash@wsj.com.

 
Share this email with a friend.
Forward ›
Forwarded this email by a friend?
Sign Up Here ›
 
Desktop, tablet and mobile. Desktop, tablet and mobile.
Access WSJ‌.com and our mobile apps. Subscribe
Apple app store icon. Google app store icon.
Unsubscribe   |    Newsletters & Alerts   |    Contact Us   |    Privacy Notice   |    Cookie Notice
Dow Jones & Company, Inc. 4300 U.S. Ro‌ute 1 No‌rth Monm‌outh Junc‌tion, N‌J 088‌52
You are currently subscribed as [email address suppressed]. For further assistance, please contact Customer Service at pro‌newsletter@dowjones.com or 1-87‌7-975-6246.
Copyright 2023 Dow Jones & Company, Inc.   |   All Rights Reserved.
Unsubscribe