As we kick off Cybersecurity Awareness Month, AI security challenges take the spotlight. Meanwhile, new marching orders say OT security teams need a comprehensive view of their systems. And get the latest on post-quantum computing standards and on a fresh batch of CIS Benchmarks!
Here are five things you need to know for the week ending October 3.
Cybersecurity Awareness Month is here and boy, do we need a special focus on cyber right now, especially on the area of AI security.
How precarious is the AI security situation? Check out these stats:
Those numbers come from the report “Oh, Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2025-2026” from the National Cybersecurity Alliance and CybSafe. Published this week, the report is based on a survey of 7,000-plus respondents from Australia, Brazil, Germany, India, Mexico, the U.K. and the U.S.
“The rapid rise in AI usage is the double-edged sword to end all double-edged swords: while it boosts productivity, it also opens up new and urgent security risks, particularly as employees share sensitive data without proper oversight,” reads the report.
And it’s not like people are clueless about AI risks. They’re worried about AI super-charging scams and cyber crime (63%), fake info (67%), security system bypassing (67%) and identity impersonation (65%). Yet, respondents’ faith in companies adopting AI responsibly and securely is only 45%.
As the gap between people’s AI adoption and AI security awareness widens, so does the attack surface security teams must protect. In fact, shadow AI, which is the unauthorized use of AI tools in the workplace, is “here to stay” and “becoming the new norm,” the report states, attributing its rise to insufficient AI security awareness training.
“Without urgent action to close this gap, millions are at risk of falling victim to AI-enabled scams, impersonation, and data breaches,” Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance, said in a statement.
There are tons of other insights, findings and recommendations in the 142-page report about a variety of cyber threats, so we encourage you to give it a read.
In the end, the report recommends zeroing-in on five core practices “that make or break security”:
To learn more about securing your AI systems, check out these Tenable resources:
The cyber industry has your back with a bunch of free resources this month. Here’s a quick roundup of some of them:
And of course, stay tuned to Tenable! As a partner of the NCA's Cybersecurity Awareness Month effort, we'll be raising awareness of simple, proven ways to boost online safety and sharing tips to put these cyber practices into action.
CISA Acting Director Madhu Gottumukkala on Cybersecurity Awareness Month 2025
If you’re tasked with securing your organization’s operational technology (OT) systems, this one’s for you.
This week, U.S. and U.K. cyber agencies published the guide “Creating and maintaining a definitive view of your OT architecture” with a simple message: you need a complete, up-to-date map of your OT systems and network.
“A definitive OT record enables organizations to conduct more comprehensive risk assessments, prioritize critical and exposed systems, and implement appropriate security controls,” CISA said in a statement.
The guidance also tackles third-party risk management, OT data security and architectural controls design.
Having the visibility that this “definitive OT record” provides is increasingly critical because OT networks are no longer isolated islands. They’re connected to IT networks and the internet, making them an attractive target.
(Image created by Tenable using Google Gemini)
This record should be your single source of truth for every OT component, connection and configuration. To properly assemble this OT architecture map, the guide, co-authored by the U.K.'s National Cyber Security Centre (NCSC), prescribes five core principles:
Following these steps will give you the visibility needed to defend your OT environment effectively, according to CISA and the NCSC.
For more information about OT security, check out these Tenable resources:
There’s a communication problem among those working on post-quantum cryptography (PQC), and the U.K.’s cyber agency wants to help solve it.
This week, the U.K. National Cyber Security Centre promoted a specification to standardize the terminology used by organizations developing and adopting cryptography that can withstand attacks powered by quantum computers.
“Consistent terminology across PQC ensures that technical proposals and discussions have clarity and consistency, and prevents misunderstandings that can lead to security issues,” reads an NCSC blog.
The new standard, which the NCSC developed along with Dr. Britta Hale from the Naval Postgraduate School, is named RFC 9794 and was published by the Internet Engineering Task Force (IETF) in June.
The new terminology is especially important for discussing "hybrid" scenarios in which traditional cryptography and PQC are used in tandem.
The goal of RFC 9794 is to ensure that everyone, from technical experts to policymakers, can communicate effectively and make informed decisions about securing systems against the quantum threat.
The new standard is already being adopted in technical drafts, academic papers and guidance from other standards bodies, demonstrating its immediate and significant impact on the cybersecurity field, according to the NCSC.
Quantum computers that can break today’s cryptographic algorithms are expected to be available at some point during the next decade.
For more information about the quantum computing threat, check out these Tenable blogs:
Does your organization use the CIS Benchmarks to strengthen software configurations? The Center for Internet Security (CIS) just rolled out its monthly update of secure-configuration guidelines. It's time to check the list and harden your systems.
This month's updates include guidelines for Windows Server, Oracle Database, Google ChromeOS and many more.
Here’s the full list:
In addition, CIS released four brand new Benchmarks:
To help organizations implement these guidelines more efficiently, new Build Kits — tools that automate the configuration process — have also been released for CIS Microsoft Windows Server 2016 STIG Benchmark v4.0.0 and CIS Microsoft Windows Server 2022 STIG Benchmark v3.0.0.
The CIS Benchmarks’ configuration recommendations are designed for hardening software against cyber attacks. There are 100-plus Benchmarks for over 25 vendor product families. Software categories covered by the CIS Benchmarks include: cloud platforms; databases; desktop and server software; mobile devices; operating systems; and more.
To get more details, read the CIS blog “CIS Benchmarks Monthly Update September 2025.” For more information about the CIS Benchmarks list, check out its home page and FAQ, as well as:
Juan has been writing about IT since the mid-1990s, first as a reporter and editor, and now as a content marketer. He spent the bulk of his journalism career at International Data Group’s IDG News Service, a tech news wire service where he held various positions over the years, including Senior Editor and News Editor. His content marketing journey began at Qualys, with stops at Moogsoft and JFrog. As a content marketer, he's helped plan, write and edit the whole gamut of content assets, including blog posts, case studies, e-books, product briefs and white papers, while supporting a wide variety of teams, including product marketing, demand generation, corporate communications, and events.