Home / Technology / Data Security Lags: Visibility is Key
Data Security Lags: Visibility is Key
6 Apr
Summary
- 35% of breaches in 2025 involved unmanaged data sources.
- Organizations struggle with basic data awareness.
- Embedded protection is crucial for data security maturity.

Enterprise cybersecurity's data security domain shows significant immaturity, with 35% of 2025 breaches involving unmanaged data. Many organizations fail to answer fundamental questions about their data: its existence, location, movement, and ownership. This challenge intensifies with complex data ecosystems involving cloud platforms, SaaS, APIs, and AI models.
Achieving data security maturity necessitates embedding protection throughout the data lifecycle, beginning with a comprehensive inventory and classification of sensitive information. Visibility into what data organizations hold—whether PII, financial, or intellectual property—is the foundational step before implementing meaningful safeguards.
Data's inherent chaos, coupled with human behavior, complicates security efforts. Unlike perimeter security, data can exist in diverse formats across various systems. Protection must therefore be embedded from data capture, employing a defense-in-depth strategy including segmentation, encryption, and access controls.
Operational sustainability in data security relies on automated governance. This is particularly crucial for AI systems that require vast data access. Techniques like synthetic data and tokenization, combined with policy-as-code, enable secure data usage while preserving analytical context.
Closing the data security maturity gap is an ongoing discipline rather than a single technological fix. Key priorities for business leaders include establishing a robust data inventory, implementing classification tied to policy, and investing in scalable, automated protection schemes integrated into workflows.