The Good Tech Companies - AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk

Episode Date: December 2, 2025

This story was originally published on HackerNoon at: https://hackernoon.com/ai-adoption-surges-while-governance-lags-report-warns-of-growing-shadow-identity-risk. Eight...y-three percent of organizations already use AI in daily operations, but only 13 percent say they have strong visibility into how these systems handle sens Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #cyber-threats, #cybernewswire, #press-release, #cyber-security-awareness, #cybersecurity-tips, #cyber-attack, #good-company, and more. This story was written by: @cybernewswire. Learn more about this writer by checking @cybernewswire's about page, and for more stories, please visit hackernoon.com. The 2025 State of AI Data Security Report reveals a widening contradiction in enterprise security. Eighty-three percent of organizations already use AI in daily operations, but only 13 percent say they have strong visibility into how these systems handle sensitive data. The report calls for a shift toward data-centric AI oversight with continuous discovery of AI use.

Transcript
Discussion (0)
Starting point is 00:00:00 This audio is presented by Hacker Noon, where anyone can learn anything about any technology. AI adoption surges while governance lags. Report warns of growing shadow identity risk by Cyber Newswire. Baltimore, Maryland, December 2nd 2025, Cyber Newswire. The 2025 State of AI Data Security Report reveals a widening contradiction in enterprise security. AI adoption is nearly universal, yet oversight remains limited. 83% of organizations already use AI in daily operations, but only 13% say they have strong visibility into how these systems handle sensitive data. Produced by cybersecurity insiders with research
Starting point is 00:00:40 support from Cyera Research Labs, the study reflects responses from 921 cybersecurity and IT professionals across industries and organization sizes. The data shows AI increasingly behaving as an ungoverned identity, a non-human user that reads faster, accesses more, and operates continuously. Yet most organizations still use human-centric identity models that break down at machine speed. As a result, two-thirds have caught AI tools over accessing sensitive information, and 23% admit they have no controls for prompts or outputs. Autonomous AI agents stand out as the most exposed frontier. Seventy-six percent of respondents say these agents are the hardest systems to secure, while 57% lack the ability to block risky AI actions in real-time.
Starting point is 00:01:27 visibility remains thin. Nearly half report no visibility into AI usage and another third say they have only minimal insight, leaving most enterprises unsure where AI is operating or what data it touches. Governance structures lag behind adoption as well. Only 7% of organizations have a dedicated AI governance team and just 11% feel prepared to meet emerging regulatory requirements, underscoring how quickly readiness gaps are widening. The report calls for a shift toward data-centric AI oversight with continuous discovery of AI use, real-time monitoring of prompts and outputs, and identity policies that treat AI as a distinct actor with narrowly scoped access driven by data sensitivity. Greater than AI is no longer just another tool, it's acting as a new
Starting point is 00:02:11 identity inside the greater than enterprise, one that never sleeps and often ignores boundaries, said Holger, Schultz with cybersecurity insiders. Without visibility and robust greater than governance, enterprises will keep finding their data in places it was never greater than meant to be. Greater than is the report cautions. You cannot secure an AI agent you do not identify, greater than and you cannot govern what you cannot see. The full 2025 state of AI data security report is available for download at HTPS-Colon slash www.com slash portfolio slash 2025-state dash of dash-i-data dash security dash report. dash siara slash media contact. Andrea.chilcod at Cybersecurity-insiders.com about cyber security
Starting point is 00:03:00 insiders provide strategic insight for security leaders, grounded in more than a decade of independent research and trusted by a global community of 600,000 cybersecurity professionals. We translate shifting market trends into clear, actionable guidance that helps CISOs strengthen their programs, make informed technology decisions, and anticipate emerging risks. We connect practitioners and innovators by giving CSOs the clarity needed to navigate a noisy market while helping solution providers align with real-world priorities. We drive this alignment through evidence-backed research, strategic CISO guides, independent product reviews, data-driven message validation, and peer-validated recognition through the Cybersecurity Excellence Awards and AI Leader Awards. more htttps colon slash slash cybersecurity-insiders dot com contact founder holdger shultz cyber security insiders holder dot shultz at cyber security dash insiders dot com this story was published as a press
Starting point is 00:03:59 release by cyber newswire under hackernoon business blogging program do your own research before making any financial decision thank you for listening to this hackernoon story read by artificial intelligence visit hackernoon dot com to read write learn and publish

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.