Baltimore, MD, 2nd December 2025, CyberNewsWire The post AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk appeared first on TechBullion.Baltimore, MD, 2nd December 2025, CyberNewsWire The post AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk appeared first on TechBullion.

AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk

The 2025 State of AI Data Security Report reveals a widening contradiction in enterprise security: AI adoption is nearly universal, yet oversight remains limited. Eighty-three percent of organizations already use AI in daily operations, but only 13 percent say they have strong visibility into how these systems handle sensitive data.

Produced by Cybersecurity Insiders with research support from Cyera Research Labs, the study reflects responses from 921 cybersecurity and IT professionals across industries and organization sizes.

The data shows AI increasingly behaving as an ungoverned identity — a non-human user that reads faster, accesses more, and operates continuously. Yet most organizations still use human-centric identity models that break down at machine speed. As a result, two-thirds have caught AI tools over-accessing sensitive information, and 23 percent admit they have no controls for prompts or outputs.

Autonomous AI agents stand out as the most exposed frontier. Seventy-six percent of respondents say these agents are the hardest systems to secure, while 57 percent lack the ability to block risky AI actions in real time. Visibility remains thin: nearly half report no visibility into AI usage and another third say they have only minimal insight — leaving most enterprises unsure where AI is operating or what data it touches.

Governance structures lag behind adoption as well. Only 7 percent of organizations have a dedicated AI governance team, and just 11 percent feel prepared to meet emerging regulatory requirements, underscoring how quickly readiness gaps are widening.

The report calls for a shift toward data-centric AI oversight with continuous discovery of AI use, real-time monitoring of prompts and outputs, and identity policies that treat AI as a distinct actor with narrowly scoped access driven by data sensitivity.

As the report cautions: “You cannot secure an AI agent you do not identify, and you cannot govern what you cannot see.”

The full 2025 State of AI Data Security Report is available for download at: https://www.cybersecurity-insiders.com/portfolio/2025-state-of-ai-data-security-report-cyera/

Media Contact: Andrea.Chilkott@cybersecurity-insiders.com

About Cybersecurity Insiders

Cybersecurity Insiders provides strategic insight for security leaders, grounded in more than a decade of independent research and trusted by a global community of 600,000 cybersecurity professionals. We translate shifting market trends into clear, actionable guidance that helps CISOs strengthen their programs, make informed technology decisions, and anticipate emerging risks.

We connect practitioners and innovators by giving CISOs the clarity needed to navigate a noisy market while helping solution providers align with real-world priorities. We drive this alignment through evidence-backed research, strategic CISO guides, independent product reviews, data-driven message validation, and peer-validated recognition through the Cybersecurity Excellence Awards and AI Leader Awards.

More: https://cybersecurity-insiders.com

Contact

Founder
Holger Schulze
Cybersecurity Insiders
holger.schulze@cybersecurity-insiders.com

Comments
Market Opportunity
null Logo
null Price(null)
--
----
USD
null (null) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

A Radical Neural Network Approach to Modeling Shock Dynamics

A Radical Neural Network Approach to Modeling Shock Dynamics

This paper introduces a non-diffusive neural network (NDNN) method for solving hyperbolic conservation laws, designed to overcome the shortcomings of standard Physics-Informed Neural Networks (PINNs) in modeling shock waves. The NDNN framework decomposes the solution domain into smooth subdomains separated by discontinuity lines, identified via Rankine-Hugoniot conditions. This approach enables accurate tracking of entropic shocks, shock generation, and wave interactions, while reducing the diffusive errors typical in PINNs. Numerical experiments validate the algorithm’s potential, highlighting its promise for extending shock-wave computations to higher-dimensional problems.
Share
Hackernoon2025/09/19 18:38
A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release

A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release

The post A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release appeared on BitcoinEthereumNews.com. KPop Demon Hunters Netflix Everyone has wondered what may be the next step for KPop Demon Hunters as an IP, given its record-breaking success on Netflix. Now, the answer may be something exactly no one predicted. According to a new filing with the MPA, something called Debut: A KPop Demon Hunters Story has been rated PG by the ratings body. It’s listed alongside some other films, and this is obviously something that has not been publicly announced. A short film could be well, very short, a few minutes, and likely no more than ten. Even that might be pushing it. Using say, Pixar shorts as a reference, most are between 4 and 8 minutes. The original movie is an hour and 36 minutes. The “Debut” in the title indicates some sort of flashback, perhaps to when HUNTR/X first arrived on the scene before they blew up. Previously, director Maggie Kang has commented about how there were more backstory components that were supposed to be in the film that were cut, but hinted those could be explored in a sequel. But perhaps some may be put into a short here. I very much doubt those scenes were fully produced and simply cut, but perhaps they were finished up for this short film here. When would Debut: KPop Demon Hunters theoretically arrive? I’m not sure the other films on the list are much help. Dead of Winter is out in less than two weeks. Mother Mary does not have a release date. Ne Zha 2 came out earlier this year. I’ve only seen news stories saying The Perfect Gamble was supposed to come out in Q1 2025, but I’ve seen no evidence that it actually has. KPop Demon Hunters Netflix It could be sooner rather than later as Netflix looks to capitalize…
Share
BitcoinEthereumNews2025/09/18 02:23
Headwind Helps Best Wallet Token

Headwind Helps Best Wallet Token

The post Headwind Helps Best Wallet Token appeared on BitcoinEthereumNews.com. Google has announced the launch of a new open-source protocol called Agent Payments Protocol (AP2) in partnership with Coinbase, the Ethereum Foundation, and 60 other organizations. This allows AI agents to make payments on behalf of users using various methods such as real-time bank transfers, credit and debit cards, and, most importantly, stablecoins. Let’s explore in detail what this could mean for the broader cryptocurrency markets, and also highlight a presale crypto (Best Wallet Token) that could explode as a result of this development. Google’s Push for Stablecoins Agent Payments Protocol (AP2) uses digital contracts known as ‘Intent Mandates’ and ‘Verifiable Credentials’ to ensure that AI agents undertake only those payments authorized by the user. Mandates, by the way, are cryptographically signed, tamper-proof digital contracts that act as verifiable proof of a user’s instruction. For example, let’s say you instruct an AI agent to never spend more than $200 in a single transaction. This instruction is written into an Intent Mandate, which serves as a digital contract. Now, whenever the AI agent tries to make a payment, it must present this mandate as proof of authorization, which will then be verified via the AP2 protocol. Alongside this, Google has also launched the A2A x402 extension to accelerate support for the Web3 ecosystem. This production-ready solution enables agent-based crypto payments and will help reshape the growth of cryptocurrency integration within the AP2 protocol. Google’s inclusion of stablecoins in AP2 is a massive vote of confidence in dollar-pegged cryptocurrencies and a huge step toward making them a mainstream payment option. This widens stablecoin usage beyond trading and speculation, positioning them at the center of the consumption economy. The recent enactment of the GENIUS Act in the U.S. gives stablecoins more structure and legal support. Imagine paying for things like data crawls, per-task…
Share
BitcoinEthereumNews2025/09/18 01:27