As economic uncertainty continues and the threat landscape grows more complex, enterprises are working to address increasing regulatory mandates while improving their security posture. The 2024 Thales Data Threat Report offers insights into new technologies, their security implications and the organizational changes for success ahead. The report analyzes global trends in threats to data and the underlying controls, regulations, risks and emerging technologies that need to be addressed. The report reflects insights from nearly 3,000 respondents at the individual contributor, managerial and executive levels from 18 countries across 37 industries and explores their data security experiences, challenges, strategies and outcomes.
Companies that had a good handle on their compliance processes and passed all of their audits were less likely to suffer from a breach. We’ll start to see more compliance and security functions coming together. This would be a huge positive step to strengthen cyber defenses and build protection around the data itself.
with 28% experiencing an attack (up from 22% last year), but planning in the event of an attack is still poor.
22% plan to integrate GenAI into products/services in the next 12 months.
is the leading way to achieve sovereignty at
28%
as part of a DevSecOps program.
initiatives was the number one cited challenge at
62%
is the primary approach to address the future compromise of classical encryption techniques. “Harvest now, decrypt later” attacks (68%) are the leading interest.
In this report, we share key findings from the 2024 Thales Data Threat Report (DTR), focused on the Latin America (LATAM) region, and briefly discuss differences between LATAM and global responses, along with enterprise observations and a summary of the threat landscape. Many of the LATAM DTR results were close to the global responses, but we call out key differences.
In this report, we share key findings from the 2024 Thales Data Threat Report (DTR), focused on the Europe and Middle East (EME) region, and we briefly discuss differences between EME and global responses, along with enterprise observations and a summary of the threat landscape.