Is this email difficult to read? View it in a web browser. ›

The Wall Street Journal ProThe Wall Street Journal Pro

CybersecurityCybersecurity

Sponsored by Zscaler logo.

Entry-Level Cyber Workers Are Losing Out to AI

By Kim S. Nash

 

Hello. AI is reshaping what it means to be "entry-level" in the cybersecurity job pool. Of more than 500,000 total cybersecurity job postings by U.S. employers last year, only 17% were open to job seekers with less than four years of experience, according to CompTIA.

As Matthew Hartman, chief strategy officer at the Merlin Group, told us: “If we shrink the on-ramps and displace apprenticeship-style learning without creating new pathways in, we’ll face a deepening talent gap as today’s senior practitioners age out.” 

Read the story from my colleague Angus Loten. 

More news: 

  • Carmaker Stellantis teams up with Microsoft to build AI cyber tools
  • Prison time for two U.S. nationals who helped North Korean imposter workers
  • Europol warns 75,000 would-be DDoS attackers
  • 🎧 New episode of the Dow Jones Risk Journal podcast 
  • And more
 

‏‏‎ ‎

CONTENT FROM: ZSCALER
AI Breaches in Minutes? Eliminate Your Attack Surface

Frontier AI models like Anthropic’s Mythos can compress breach timelines to minutes. The best defense is to remove what attackers can see. Zscaler helps you take critical apps off the public internet, give access only to the right people, and reduce business risk thus limiting disruption and protecting uptime. Don't wait for the breach, eliminate your attack surface today.

Read the report

 

More Cyber News

PHOTO: LAURA PROCTOR/BLOOMBERG

Carmaker Stellantis signed a five-year deal with Microsoft to jointly build AI, cyber and engineering systems. The plan includes using AI analytics to boost Stellantis cyber defenses in digital systems embedded in its auto models as well as in manufacturing. (Reuters)

The parent company of global retailer Zara blamed a former tech supplier for a breach of a shopper transaction database. Spain's Inditex said customer and payment data wasn't affected. The company didn't name the tech provider. (Reuters)

Two New Jersey residents were sentenced for their parts in helping imposter tech workers from North Korea infiltrate more than 100 U.S. companies over several years. Kejia Wang of Edison, N.J., was sentenced to nine years in prison. Zhenxing Wang, of New Brunswick, N.J., received a sentence of nearly eight years. 

  • The two men pleaded guilty to running laptop farms that helped North Korean scammers assume the identities of at least 80 U.S. residents in return for a combined $600,000, the Justice Department said. 
 

🎧 New episode: A U.S. blockade is underway of Iranian ports in the Strait of Hormuz. Will it bring Tehran back to the negotiating table or further fracture trans-Atlantic relationships? 

  • Also, companies are still burnishing their climate credentials despite reversals in federal policy. James Rundle hosts.
  • Listen every Friday on Apple Podcasts, Spotify and Amazon.
 

Don't do it: The Europol police agency sent emails to 75,000 would-be hackers warning them not to follow through on likely plans to launch distributed denial-of-service attacks. Their contact information came to light in recent takedowns of several DDoS-for-hire services (TechCrunch)

  • Related reading from WSJ Pro: Online Crime Busts Are Teaching Hackers How to Avoid Getting Caught

Publisher McGraw Hill confirmed a ShinyHunters claim that data related to user accounts was stolen via a hack of a Salesforce customer-management system. The hacking group said it stole information about 13.5 million accounts. (Bleeping Computer)

  • Related reading from WSJ Pro: Salesforce-Linked Security Breach Fallout Escalates With Qantas Leak

PHOTO: SHELBY KNOWLES/BLOOMBERG

Pizza chain Papa John’s International agreed to pay $2.25 million to settle a 2021 data-breach lawsuit that accused the company of violating employee privacy under the wide-ranging Illinois Biometric Information Privacy Act. Papa John's required employees to sign in with fingerprint scans, allegedly without consent. The company denied wrongdoing.

  • People who worked at a franchisee-owned Papa John's location in Illinois from Dec. 3, 2015, to Dec. 17, 2025 are covered.
 

About Us

The WSJ Pro Cybersecurity team is Deputy Bureau Chief Kim S. Nash and reporters Angus Loten and James Rundle. Follow us on X @WSJCyber. Reach the team by replying to any newsletter you receive or by emailing Kim at kim.nash@wsj.com.

 
Share this email with a friend.
Forward ›
Forwarded this email by a friend?
Sign Up Here ›
 
Desktop, tablet and mobile. Desktop, tablet and mobile.
Access WSJ‌.com and our mobile apps. Subscribe
Apple app store icon. Google app store icon.
Unsubscribe   |    Newsletters & Alerts   |    Contact Us   |    Privacy Notice   |    Cookie Notice
Dow Jones & Company, Inc. 4300 U.S. Ro‌ute 1 No‌rth Monm‌outh Junc‌tion, N‌J 088‌52
You are currently subscribed as [email address suppressed]. For further assistance, please contact Customer Service at pro‌newsletter@dowjones.com or 1-87‌7-975-6246.
Copyright 2026 Dow Jones & Company, Inc.   |   All Rights Reserved.
Unsubscribe