2025-Data-Threat-Report

#2025DataThreatReport

DIGITAL THREAT INDEX Perspectives and Pathways to Digital Sovereignty and Transformation AI, Quantum and the Evolving Data Threatscape DATA THREAT REPORT

cpl.thalesgroup.com

Table of Contents 03 Introduction 04 Executive Summary 06 Key Findings 08

In the Era of AI, Data Takes Center Stage

12 14 17 19 21 23 26 29 32 33

Trends in Data Security

Right on ‘Q’

There is No Data Security Without Application Security

Some Progress in Reducing Data Breaches

The Threat Landscape, Inside and Out

Digital Sovereignty as a Product of Data Security

Cloud Devops Evolves to Platform Engineering

Threat Reality Versus Investment Priorities, and the Need for Alignment

Conclusion

About this Study

2025 Thales Data Threat Report #2025DATATHREATREPORT

Introduction

For five consecutive years, the Thales Data Threat Report has analyzed worldwide trends in data security, cloud adoption, compliance and security strategies. The 2025 report continues to examine internal vulnerabilities, external threats and their impacts on enterprise assets. The Data Threat Report also evaluates new and evolving technologies affecting risk management and data security. The report revisits core data security principles in light of evolving technology, industry, regulatory and risk landscapes, with additional focus this year on application security. As always, the Data Threat Report encourages and equips security leaders to build stronger alliances spanning their own organizations and partner ecosystems to achieve broader enterprise goals.

Source: 2025 Data Threat Report custom survey from S&P Global Market Intelligence 451 Research, commissioned by Thales.

Sponsored by

2025 Thales Data Threat Report

3

Key Findings Tracking AI Development

69 %

73 %

regard fast-moving ecosystem as most concerning GenAI security risk, followed by lack of integrity (64%) and trustworthiness (57%).

of respondents are investing in GenAI-specific tools, with 20% using newly allocated budget.

11 % considering their AI implementations as transformational.

Right on ‘Q’

Organizations identified these major quantum computing security threats: 63 % 61 % 58 % future encryption compromise

key distribution future decryption of today’s data, including harvest now, decrypt later

Data Security Fuels Digital Sovereignty

55 %

were driven to pursue digital sovereignty by specific customer, regional or global privacy mandates.

42 %

said that encryption and key management provide sufficient protection.

Download the full report and

read more about AI, Quantum and the Evolving Data Threatscape

Page 1 Page 2 Page 3 Page 4 Page 5

Made with FlippingBook interactive PDF creator