#2025DataThreatReport
DIGITAL THREAT INDEX Perspectives and Pathways to Digital Sovereignty and Transformation AI, Quantum and the Evolving Data Threatscape DATA THREAT REPORT
cpl.thalesgroup.com
Table of Contents 03 Introduction 04 Executive Summary 06 Key Findings 08
In the Era of AI, Data Takes Center Stage
12 14 17 19 21 23 26 29 32 33
Trends in Data Security
Right on ‘Q’
There is No Data Security Without Application Security
Some Progress in Reducing Data Breaches
The Threat Landscape, Inside and Out
Digital Sovereignty as a Product of Data Security
Cloud Devops Evolves to Platform Engineering
Threat Reality Versus Investment Priorities, and the Need for Alignment
Conclusion
About this Study
2025 Thales Data Threat Report #2025DATATHREATREPORT
Introduction
For five consecutive years, the Thales Data Threat Report has analyzed worldwide trends in data security, cloud adoption, compliance and security strategies. The 2025 report continues to examine internal vulnerabilities, external threats and their impacts on enterprise assets. The Data Threat Report also evaluates new and evolving technologies affecting risk management and data security. The report revisits core data security principles in light of evolving technology, industry, regulatory and risk landscapes, with additional focus this year on application security. As always, the Data Threat Report encourages and equips security leaders to build stronger alliances spanning their own organizations and partner ecosystems to achieve broader enterprise goals.
Source: 2025 Data Threat Report custom survey from S&P Global Market Intelligence 451 Research, commissioned by Thales.
Sponsored by
2025 Thales Data Threat Report
3
Key Findings Tracking AI Development
69 %
73 %
regard fast-moving ecosystem as most concerning GenAI security risk, followed by lack of integrity (64%) and trustworthiness (57%).
of respondents are investing in GenAI-specific tools, with 20% using newly allocated budget.
11 % considering their AI implementations as transformational.
Right on ‘Q’
Organizations identified these major quantum computing security threats: 63 % 61 % 58 % future encryption compromise
key distribution future decryption of today’s data, including harvest now, decrypt later
Data Security Fuels Digital Sovereignty
55 %
were driven to pursue digital sovereignty by specific customer, regional or global privacy mandates.
42 %
said that encryption and key management provide sufficient protection.
Download the full report and
read more about AI, Quantum and the Evolving Data Threatscape
Page 1 Page 2 Page 3 Page 4 Page 5Made with FlippingBook interactive PDF creator