1、DIGITALTHREATINDEXPerspectives and Pathwaysto Digital Sovereigntyand TransformationAI,Quantum and the Evolving Data T#2025DataThreatReportDATA THREAT REPORTTable of Contents03 Introduction04 Executive Summary06 Key Findings08 In the Era of AI,Data Takes Center Stage12 Trends in Data Security14 Right
2、 on Q 17 There is No Data Security Without Application Security 19 Some Progress in Reducing Data Breaches 21 The Threat Landscape,Inside and Out 23 Digital Sovereignty as a Product of Data Security26 Cloud Devops Evolves to Platform Engineering29 Threat Reality Versus Investment Priorities,and the
3、Need for Alignment32 Conclusion 33 About this StudySponsored byIntroductionSource:2025 Data Threat Report custom survey from S&P Global Market Intelligence 451 Research,commissioned by Thales.For five consecutive years,the Thales Data Threat Report has analyzed worldwide trends in data security,clou
4、d adoption,compliance and security strategies.The 2025 report continues to examine internal vulnerabilities,external threats and their impacts on enterprise assets.The Data Threat Report also evaluates new and evolving technologies affecting risk management and data security.The report revisits core
5、 data security principles in light of evolving technology,industry,regulatory and risk landscapes,with additional focus this year on application security.As always,the Data Threat Report encourages and equips security leaders to build stronger alliances spanning their own organizations and partner e
6、cosystems to achieve broader enterprise goals.32025 Thales Data Threat Report#2025DATATHREATREPORT2025 Thales Data Threat ReportExecutive Summary The 2025 Data Threat Report is based on survey data from nearly 3,200 IT and security professionals across 20 countries and 15 industries,including financ