Is this email difficult to read? View it in a web browser. ›

The Wall Street Journal ProThe Wall Street Journal Pro

CybersecurityCybersecurity

Sponsored by Zscaler logo.

Palantir Sues Former Employees for Allegedly Stealing Company Secrets

By Kim S. Nash

 

Hello. In a lawsuit filed Thursday in the Southern District of New York, Palantir alleged that two former workers violated noncompetition agreements after leaving the company and working on a “copycat” business—Percepta—owned by the venture-capital firm General Catalyst.

Palantir, a data-analysis firm one of whose early backers was the Central Intelligence Agency, further alleged that Cohen stole a set of highly confidential documents before departing. Read the full WSJ story.

More news below.

 

‏‏‎ ‎

CONTENT FROM: ZSCALER
Why CIOs Are Adopting A Cafe-like Branch Architecture

Ransomware attacks often start with one compromised user — a single user in a branch can infect everything on your network. This is facilitated by an underlying design principle of MPLS and SD-WAN — lateral movement. Zscaler CEO Jay Chaudhry explains why CIOs are embracing cafe-like branches to stop ransomware, increase business agility and reduce cost.

It’s time to embrace cafe-like branches

 

More Cyber News

PHOTO: DAVID GRAY/AFP/GETTY IMAGES

Longtime Qantas executive to depart. Catriona Larritt, chief customer and digital officer, plans to leave the Australian airline in December, Reuters reported, citing an internal memo. Qantas was hit by hackers in July, leading to a data breach affecting 6.7 million customers. 

  • Risk chief Andrew Monaghan will take over cybersecurity oversight, the memo said, with CISO Matt Biber to report to him.

Telecom providers are likely to get reprieve from cyber regulations. The Federal Communications Commission is set to vote in November on a proposal to kill cyber rules put in place under prior leadership that required telecom companies to secure their networks against hackers. (Cybersecurity Dive)

  • The rule isn't sufficient to protect against hacking and oversteps the FCC's authority, FCC Chair Brendan Carr said in a blog post. 
  • Instead, the November meeting will outline "substantial steps" the agency and telecom sector have taken to strengthen cyber protections, Carr said.

How to secure Microsoft Exchange: U.S., Australian and Canadian cyber authorities issued guidance for protecting Microsoft Exchange systems as the threat to the widely used technology "remains persistent." 

  • Patching is the most effective defense, the guide said. "Malicious cyber actors can quickly develop exploits within days of patch releases, so updates should be applied as soon as practicable," it said. 
  • Getting rid of old versions of the technology and enabling built-in mitigation procedures are also critical. Details are here. 

Cities across the U.S. are putting robots to work in jobs like firefighting and lawn mowing, even as cybersecurity and surveillance questions remain. (WSJ)

 

About Us

The WSJ Pro Cybersecurity team is Deputy Bureau Chief Kim S. Nash and reporters Angus Loten and James Rundle. Follow us on X @WSJCyber. Reach the team by replying to any newsletter you receive or by emailing Kim at kim.nash@wsj.com.

 
Share this email with a friend.
Forward ›
Forwarded this email by a friend?
Sign Up Here ›
 
Desktop, tablet and mobile. Desktop, tablet and mobile.
Access WSJ‌.com and our mobile apps. Subscribe
Apple app store icon. Google app store icon.
Unsubscribe   |    Newsletters & Alerts   |    Contact Us   |    Privacy Notice   |    Cookie Notice
Dow Jones & Company, Inc. 4300 U.S. Ro‌ute 1 No‌rth Monm‌outh Junc‌tion, N‌J 088‌52
You are currently subscribed as [email address suppressed]. For further assistance, please contact Customer Service at pro‌newsletter@dowjones.com or 1-87‌7-975-6246.
Copyright 2025 Dow Jones & Company, Inc.   |   All Rights Reserved.
Unsubscribe