Survey: 60 Percent of Organizations Using AI in IT Infrastructure

Netwrix, a cybersecurity provider focused on data and identity threats, today announced the release of its annual global 2025 Cybersecurity Trends Report based on a global survey of 2,150 IT and security professionals from 121 countries. It reveals that 60% of organizations are already using artificial intelligence (AI) in their IT infrastructure and 30% are considering implementing AI.

Research shows that AI has impacted organizations’ security posture. 37% of respondents say that new AI-driven threats forced them to adjust their security approach, 30% report the emergence of a new attack surface due to the use of AI by their business users, and 29% struggle with compliance since auditors require proof of data security and privacy in AI-based systems.

“Today’s AI-driven business processes are vulnerable to a host of new threats that security teams must be prepared for,” says Jeff Warren, Chief Product Officer at Netwrix. “The data shows a rise in security incidents that are identity-driven and infrastructure-focused. Indeed, identity-driven attacks are likely to dominate even more, with crafty new ways to bypass MFA, abuse of machine-to-machine identities like service accounts and tokens, AI-powered deepfake voice and video phishing, and even synthetic identity creation at scale.”

“AI workloads trained on proprietary enterprise data represents intellectual property and are attractive targets for cybercriminals,” says Dirk Schrader, VP of Security Research at Netwrix. “It is important to secure data across the entire AI lifecycle, from ingestion to model training to monitoring API endpoints for any signs of prompt injection, abuse or model leakage. Finally, security teams should apply Zero Trust principles in the world of AI: assume every interaction with the AI system, internal or external, could be malicious, and enforce strict authentication, least privilege access and continuous monitoring.”

In this year’s survey, we investigated incidents that demanded a dedicated response from security teams, rather than those that were automatically detected and remediated. Based on this definition, 51% of respondents confirmed experiencing a security incident in the past 12 months. The number of organizations reporting no impact from security incidents is shrinking rapidly, from 45% in 2023 to just 36% in 2025. 75% of respondents reported financial damage due to attacks — a significant increase from 60% in 2024. The number of organizations estimating their damage at $200,000 or more nearly doubled, from 7% to 13%.

“Direct breach costs are well understood, but more subtle costs include intellectual property loss, product development delays, and reputational damage, which are all hard to quantify but can be devastating, especially if innovation is essential to the business model,” added Warren. “Breaches damage brand trust, and customer churn often peaks when the time comes to renew the contract — well after the immediate crisis seems resolved.”

For more information about the most common types of security incidents, organizational IT priorities, cyber insurance trends and more, download the report here.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.