Key Takeaways from the CSA Understanding Data Security Risk Survey

Key Takeaways from the CSA Understanding Data Security Risk Survey
madhav
Tue, 03/04/2025 – 04:32

As hybrid and multi-cloud environments become increasingly popular, identifying, prioritizing, and mitigating data security risks becomes increasingly complex. How can we tackle this complexity? By gaining insight into how organizations handle risk. That’s the goal of the latest Cloud Security Alliance (CSA) Understanding Data Security Risk survey, which Thales is a proud sponsor of.

Data Security Risk

The survey report shares critical insights into the challenges organizations face when managing data security risk and offers actionable steps they can take to secure their most sensitive assets. So, let’s examine some of the key takeaways.

Limited Risk Understanding, Limited Risk Management

Perhaps the most notable revelation from the CSA report is that organizations have gaps in their ability to identify and prioritize vulnerabilities, creating significant challenges in managing data risks.

Statistics from the report drive home the scale of the issue: 31% of respondents say they lack tools to identify their riskiest data sources, while 12% don’t even know if they have such tools. This lack of adequate tooling, among other factors, resulted in 80% of respondents saying they don’t feel highly confident in their ability to identify high-risk data sources.

Other contributing factors include the complexity of hybrid and multi-cloud environments. Over half of the respondents reported operating in hybrid environments, while 27% use multi-cloud setups. The fragmented risk profiles and data distribution inherent in these cloud platforms make it harder to locate and prioritize vulnerabilities and can result in inconsistent management practices.

Organizations can remediate these issues by implementing Thales Data Risk Intelligence capabilities. It unites Thales CipherTrust and Imperva Data Security Fabric platforms to provide a risk score and actionable recommendations for proactively identifying and mitigating risks.

Misalig

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Security Boulevard

Read the original article: