Global Edition

2024 Thales Data Threat Report

Navigating New Threats and Overcoming Old Challenges

#2024DataThreatReport
2024 DTR Global

Insights into new technologies, their security implications and the organizational changes for success ahead

As economic uncertainty continues and the threat landscape grows more complex, enterprises are working to address increasing regulatory mandates while improving their security posture. The 2024 Thales Data Threat Report offers insights into new technologies, their security implications and the organizational changes for success ahead. The report analyzes global trends in threats to data and the underlying controls, regulations, risks and emerging technologies that need to be addressed. The report reflects insights from nearly 3,000 respondents at the individual contributor, managerial and executive levels from 18 countries across 37 industries and explores their data security experiences, challenges, strategies and outcomes.

Sponsored by

Edvance

Exclusi

Netpoleon

Download the full Global report and read more about 
Navigating New Threats and Overcoming Old Challenges.

Companies that had a good handle on their compliance processes and passed all of their audits were less likely to suffer from a breach. We’ll start to see more compliance and security functions coming together. This would be a huge positive step to strengthen cyber defenses and build protection around the data itself.
Sebastien Cano Senior Vice President Cloud Protection & Licensing Thales
Sebastien Cano

Key Findings

Data Breach Trends and Threats

Ransomware attacks are more common,

with 28% experiencing an attack (up from 22% last year), but planning in the event of an attack is still poor.

Ransomware icon

AI icon

Risks to Emerging Technologies

The generative AI boom is underway:

22% plan to integrate GenAI into products/services in the next 12 months.

Compliance and Sovereignty Concerns

Mandatory external key management

is the leading way to achieve sovereignty at
28%

Key Management icon

DevSecOps icon

Increasing DevOps Challenges

Over half (53%) have implemented a formal security champions program

as part of a DevSecOps program.

Identity Complexities and Compromise

Achieving security consistency within CIAM

initiatives was the number one cited challenge at
62%

CIAM icon

PQC icon

Risks to Emerging Technologies

Prototyping post-quantum cryptography (PQC)

is the primary approach to address the future compromise of classical encryption techniques. “Harvest now, decrypt later” attacks (68%) are the leading interest.

Regional Research

Global Edition

2024 Thales Data Threat Report

Read more about Navigating New Threats and Overcoming Old Challenges

2024 Data Threat Report
 

×