European and Middle East Edition

2024 Thales Data Threat Report

Navigating New Threats and Overcoming Old Challenges

#2024DataThreatReport
2024 DTR Global

Insights into new technologies, their security implications and the organizational changes for success ahead

As economic uncertainty continues and the threat landscape grows more complex, enterprises are working to address increasing regulatory mandates while improving their security posture. In this report, we share key findings from the 2024 Thales Data Threat Report (DTR), focused on the Europe and Middle East (EME) region, and we briefly discuss differences between EME and global responses, along with enterprise observations and a summary of the threat landscape. Many of the EME DTR results were close to the global responses, but we call out key differences. 

Sponsored by

Edvance

Exclusi

Netpoleon

Download the European and Middle East report and read more about 
Navigating New Threats and Overcoming Old Challenges.

Companies that had a good handle on their compliance processes and passed all of their audits were less likely to suffer from a breach. We’ll start to see more compliance and security functions coming together. This would be a huge positive step to strengthen cyber defenses and build protection around the data itself.
Sebastien Cano Senior Vice President Cloud Protection & Licensing Thales
Sebastien Cano

Key Findings

Data Breach Trends and Threats

Ransomware attacks are more common,

with 27% experiencing an attack (up from 21% last year), but planning in the event of an attack is still poor.

Ransomware icon

AI icon

Risks to Emerging Technologies

The generative AI boom is underway:

23% plan to integrate GenAI into products/services in the next 12 months.

Compliance and Sovereignty Concerns

Key management systems usage

average slightly declined in EME, from 6.0 to 5.8, down only 3%

Key Management icon

DevSecOps icon

Increasing DevOps Challenges

Over half (55%) cited secrets management as a top DevOps challenge.

Identity Complexities and Compromise

Achieving security consistency within CIAM


initiatives was the number one cited challenge at 59%

CIAM icon

PQC icon

Risks to Emerging Technologies

Prototyping post-quantum cryptography (PQC)

is the primary approach to address the future compromise of classical encryption techniques. “Harvest now, decrypt later” attacks (70%) are the leading interest.

Global Edition

2024 Thales Data Threat Report

Read more about Navigating New Threats and Overcoming Old Challenges

2024 Data Threat Report
 

×