Want recruiters to show you the money? A new report says AI skills are your golden ticket. Plus, cyber teams are all in on AI, including agentic AI tools. Oh, and please patch a nasty Oracle zero-day bug ASAP. And get the latest on vulnerability management, IoT security and cyber fraud.
Here are six things you need to know for the week ending October 10.
Looking to give your cybersecurity career and salary a boost? Develop AI security skills.
The intel comes from Robert Half’s recently-released “2026 Salary Guide.” If you know how to use AI for things like managing vulnerabilities, automating security, or hunting for threats, you’re going to be “highly sought.”
“Many employers look for candidates who can work with AI programs or models, such as neural networks and natural language processing, for predicting and mitigating cyber risks,” Robert Half wrote in an article about the guide titled “What to Know About Hiring and Salary Trends in Cybersecurity.”
Cyber hiring managers are also eager for candidates with AI-related certifications, like Microsoft’s AI-900 and Google Cloud’s Machine Learning Engineer.
Of course, AI skills aren’t the only game in town. Having experience in these areas will also make your resume shine:
The report also says that having certain credentials also makes you a more attractive candidate for hiring managers, including:
Just remember to work on your people skills, too. The report reminds us that things like good communication and critical thinking are critical for cybersecurity roles.
And here’s Robert Half’s average salaries for “midpoint” cyber pros – meaning, those with a moderate amount of experience in these roles who meet most requirements and may possess relevant certifications:
Bottom line: It’s a good time to be in cyber: 53% of U.S. employers are willing to open their wallets wider for candidates with the right skills.
To get more details, check out:
Organizations are leaning heavily into AI to beef up their cyber defenses, including by prioritizing the use of agentic AI tools that can execute tasks with minimal human guidance.
That’s a key — albeit not unsurprising — discovery from PwC’s new “2026 Global Digital Trust Insights: C-suite playbook and findings” report, based on a global survey of almost 4,000 business and technology executives.
“AI’s potential for transforming cyber capabilities is clear and far-reaching,” reads a PwC article with highlights from the report.
For example, organizations are prioritizing the use of AI to improve how they allocate cyber budgets; use managed cybersecurity services; and tackle cyber skills gaps.
With regards to respondents’ priorities for AI cybersecurity capabilities in the coming year, threat hunting ranked first, followed by agentic AI. Other areas include identity and access management, and vulnerability scanning / vulnerability assessments.
AI security capabilities organizations will prioritize over the next 12 months
Meanwhile, organizations plan to use agentic AI primarily to boost cloud security, data protection and security operations in the coming year. Other agentic AI priority areas include security testing; governance, risk and compliance; and identity and access management.
“Businesses are recognising that AI agents — autonomous, goal-directed systems capable of executing tasks with limited human intervention — have enormous potential to transform their cyber programmes,” reads the report.
Beyond AI, the report also calls on cyber teams to prioritize prevention over reaction. Proactive work like monitoring, assessments, testing, and training is always cheaper than the crisis-mode alternative of incident response, remediation, litigation, and fines. Yet, only 24% of organizations said they spend “significantly more” on proactive measures.
Other topics covered in the report include geopolitical risk; cyber resilience; the quantum computing threat; and the cyber skills gap.
For more information about AI data security, check out these Tenable resources:
Hackers are exploiting a critical zero-day vulnerability in Oracle’s E-Business Suite (EBS), and cyber experts including the U.K. National Cyber Security Centre (NCSC) are urging organizations to patch affected systems ASAP.
The vulnerability, CVE-2025-61882, exists in the BI Publisher Integration component of Oracle Concurrent Processing in versions 12.2.3 to 12.2.14 of Oracle EBS.
Attackers can exploit the vulnerability remotely without authentication. Once exploited, the vulnerability can grant an attacker the ability to execute code remotely on breached EBS systems and completely compromise them, Oracle said in its security advisory.
Indications about the zero-day exploits surfaced on October 2 via reports that the Cl0p ransomware gang was telling Oracle customers it had swiped data from their EBS systems, as Tenable Research explains in its FAQ blog about CVE-2025-61882.
Exploits of this EBS vulnerability may have started in July or August, according to various reports published this week.
NCSC recommendations for organizations running vulnerable versions of Oracle E-Business Suite include:
To get more information, read:
During our recent webinar “Beyond the endpoint: Exposure management that’s proactive,” we polled attendees on their vulnerability management processes and challenges. Check out what they said.
(Source: Tenable webinar poll of 57 respondents, Beyond the Endpoint: Exposure Management That’s Proactive, October 1, 2025)
(Source: Tenable webinar poll of 63 respondents, Beyond the Endpoint: Exposure Management That’s Proactive, October 1, 2025)
Watch the webinar on-demand to learn why endpoint-first vulnerability management falls short and how Tenable closes the gaps across IT, cloud, OT, identity and more.
This one is for vendors of internet-of-things (IoT) products that are interested in improving the cybersecurity of these wares.
The U.S. National Institute of Standards and Technology (NIST) has released a revised draft of its “Foundational Cybersecurity Activities for IoT Product Manufacturers” publication, which seeks to ensure IoT products meet customer security expectations.
Here’s some of what’s new in the updated document, which incorporates feedback from over 400 participants through workshops, written comments and forums:
NIST is actively seeking public feedback on this draft until October 31, 2025, and is developing a “worked example” to demonstrate the practical application of the guidance.
“We are committed to advancing IoT cybersecurity and fostering a secure ecosystem for connected product technologies across industries,” reads the NIST blog “Updating Foundational Activities for IoT Product Manufacturers.”
For more information about IoT security, check out these Tenable resources:
Fraud is costing businesses a fortune, as scammers exploit the poor protection of customers’ digital identities.
That’s the urgent message from TransUnion’s report “H2 2025 Update: Top Fraud Trends: Digital Identity Risk Accelerates Fraud Losses” published this week.
“Fraudsters are exploiting every digital touchpoint, from account creation to login and transaction. The financial impact is staggering, and organizations must rethink how they verify identity and secure customer interactions,” Steve Yin, Global Head of Fraud at TransUnion, said in a statement.
Here are key takeaways from the report, which is based on TransUnion proprietary data and surveys of business leaders in six countries and consumers across 18 countries:
So what can organizations do about this threat? The report’s recommendations include:
As the report bluntly states: “You must assume a security posture that all identity data and credentials presented to your organization are compromised.”
For more information about identity and access management (IAM) security, check out these Tenable blogs: