Reality Check: Accenture Research Shows Enterprises Face a Security Deficit in the AI Era

Amy Larsen DeCarlo – Principal Analyst, Security and Data Center Services

Summary Bullets:

  • In a survey of 2,286 technology and security-focused executives, Accenture reports that only 34% have a mature cybersecurity strategy.
  • Just 20% say they are confident in their ability to protect their generative AI (GenAI) models from a breach.

Artificial intelligence (AI) presents as a double-edged sword for many enterprises. The technology has the potential to revolutionize business processes and drive further innovation but is protecting the model from advancing threats that could compromise the integrity of data output. This is a daunting challenge that few organizations have a handle on today. Add threat actors harnessing AI for their own nefarious purposes to the mix, and the situation becomes much more daunting for the enterprise.

Continue reading “Reality Check: Accenture Research Shows Enterprises Face a Security Deficit in the AI Era”

Enterprises Take Up Arms Against Perilous Threats but Still Struggle with Unwieldy Security Tools

Amy Larsen DeCarlo – Principal Analyst, Security and Data Center Services

Summary Bullets:

  • Enterprises are under constant threat with no signs of abatement. The Verizon 2025 Data Breach Investigations Report (DBIR) notes a 37% rise in ransomware versus 2024.
  • Cisco’s May 2025 State of Security Report found that 59% of the 2,058 security professionals surveyed spend excessive resources maintaining tools and affiliated workflows.

The nature of cybersecurity is dynamic, as the threat landscape is in constant flux, making the discipline a daunting exercise environment for security practitioners. Even well-resourced organizations struggle to manage risk effectively as bad actors apply a combination of advanced technology and sophisticated techniques to exploit enterprise vulnerabilities. Verizon’s 2025 Database Investigations Report (DBIR), an examination of 22,052 security incidents, 12,195 of which were verified to be data breaches, found that in 20% of all breaches, vulnerabilities were the entryway for a breach. This makes it the second most common initial avenue for a breach, just behind credential abuse.

Continue reading “Enterprises Take Up Arms Against Perilous Threats but Still Struggle with Unwieldy Security Tools”

Facing an Exodus of Healthcare Workers, Providers Turn to AI but are Overlooking Important Strategic Elements

Amy Larsen DeCarlo – Principal Analyst, Security and Data Center Services

Summary Bullets:

  • With the demographic that represents the biggest healthcare consumer spiking at the same time hundreds of thousands of healthcare workers are leaving the sector in droves, the industry is looking to artificial intelligence (AI).
  • An Accenture survey of healthcare provider executives found that while most are piloting AI projects, the ad hoc approaches many are taking may find them coming up short of their full potential.

There is a perfect storm hitting the healthcare industry. The population of 60- to 90-year-olds, the largest users of healthcare services, is projected to spike by 45% over the course of the next 20 years. This comes as a post-pandemic flight of healthcare workers is happening. The National Council of State Boards of Nursing (NCSBN) projects that 900,000 nurses in the US will leave their positions by 2027.

Continue reading “Facing an Exodus of Healthcare Workers, Providers Turn to AI but are Overlooking Important Strategic Elements”

US Federal Government Demands IT Consulting Firm “Defends the Spend” in a Bid to Take Back Some of the $65 Billion Committed to Contracts

Amy Larsen DeCarlo – Principal Analyst, Security and Data Center Services

Summary Bullets:

• The US administration is making clear its aim to improve government efficacy and slash expenses across the board.

• In IT, the General Services Administration (GSA) singled out its 10 largest consulting partners, demanding they justify their contracting value to reduce the current $65 billion public sector spend.

Change is inevitable with administration transitions, but the sharp pendulum swings the Trump US presidency brought with it have been swift and dramatic. There is no surprise that cuts were coming, but the shock is the speed and scale at which it is happening, and the profound impact these moves are having on IT specifically.

Continue reading “US Federal Government Demands IT Consulting Firm “Defends the Spend” in a Bid to Take Back Some of the $65 Billion Committed to Contracts”

New IBM Research Puts a Fine Point on How Complexity Impedes Effective Cybersecurity

Amy Larsen DeCarlo – Principal Analyst, Security and Data Center Services

Summary Bullets:

• IT security teams contend with managing dozens of individual security solutions, often with less than stellar results.

• In a recent study conducted by IBM and Palo Alto Networks, 52% of the surveyed executives call out complexity as being the biggest obstacle to effective security.

Cybersecurity has never been a simple exercise. As enterprises have evolved to become distributed and virtual, the perimeter has faded, and IT has had to find new ways to protect enterprise assets. The move to hybrid and remote operations in recent years has only complicated this further. Add budget pressure and limited internal security expertise, and the pressure becomes that much more intense.

Continue reading “New IBM Research Puts a Fine Point on How Complexity Impedes Effective Cybersecurity”

The World Economic Forum Releases its 2025 Cybersecurity Outlook, and the New Year Looks Complicated

Amy Larsen DeCarlo – Principal Analyst, Security and Data Center Services

Summary Bullets:

• In its report on the outlook for cybersecurity in 2025, the World Economic Forum observed enterprises are contending with a daunting threat environment while simultaneously trying to cover gaps in their internal security skill sets.

• Based on a survey of 321 security professionals and more in-depth interviews with 43 CISOs, the research highlighted discrepancies in the level of confidence in their cyber resilience by organizational size.

Findings from the World Economic Forum (WEF)’s Global Security Outlook Report 2025, conducted in partnership with Accenture, underscores the challenges enterprises and smaller organizations are facing amid global turmoil, relentless threat actors, and fast-evolving technology innovation. The results of the WEF survey of security professionals in 57 countries also show major differences in organizations based on size. Thirty-five percent (35%) of small organizations are concerned that their cyber resilience is lacking, seven times more than in 2022. Large enterprises report the opposite, with half as many saying their cyber resilience was unsatisfactory.

Continue reading “The World Economic Forum Releases its 2025 Cybersecurity Outlook, and the New Year Looks Complicated”

Cyberattack with China Ties Against Major Telcos May Have Tapped into Critical US Federal Government Data

Amy Larsen DeCarlo – Principal Analyst, Security and Data Center Services

Summary Bullets:

• In a published blog, Lumen says its Black Lotus Labs has identified an active exploitation of a zero-day vulnerability in its Versa Director servers, which orchestrate its SD-WAN network services.

• Though the company, attributing the attack to threat actors Volt Typhoon backed by China, didn’t specify which of its clients would have been affected, others suggest the attack may have penetrated the infrastructure supporting sensitive government wiretapping communications.

Reports circulated this summer that state-sponsored cybercriminals connected to China hacked into US federal government resources via major telecom providers’ networks. Last week, it was revealed by several journalism sources including the Wall Street Journal that the target of the activity was federal government communications related to court-ordered network wiretapping applications that the hackers accessed through AT&T, Lumen, and Verizon’s networks. Though no one with direct knowledge of the situation was named, anonymous sources say the threat actors could have been tapped into the networks months ago.

Continue reading “Cyberattack with China Ties Against Major Telcos May Have Tapped into Critical US Federal Government Data”

Amazon Employees React Negatively to New Five Day Return to Office Mandate

Summary Bullets:

Amy Larsen DeCarlo – Principal Analyst, Security and Data Center Services
  • A survey of 2,585 Amazon staffers conducted by Blind, an anonymous social media platform, reported that 91% are dissatisfied with the new five-day in-office policy.
  • Separate Blind research involving employees from multiple companies found 65% are anxious about return to office (RTO) orders.

If there was any upside to the 2020 COVID 19-driven lockdown, the overnight move to remote work granted many corporate employees a new work from home perk. The move eliminated difficult and often costly commutes. Working from home also gave families flexibility to lessen the load in areas like childcare and logistics. But the biggest benefit of working from home might be the gift of time. Many enterprises retained at least hybrid working operations, requiring staff to come in on a limited basis. But now, more than four years after lockdown began, more corporations are calling employees back in the office for the full five days.

Continue reading “Amazon Employees React Negatively to New Five Day Return to Office Mandate”

Healthcare Organizations Struggle to Evade Ransomware

Amy Larsen DeCarlo – Principal Analyst, Security and Data Center Services

Summary Bullets:

• A recent RiskRecon study of 1,454 serious ransomware cases finds that healthcare provider organizations account for more than 18% of these incidents, by far the most targeted sector.

• Geography was not a factor with healthcare providers under fire around the globe.

As an industry, healthcare is not exactly known as information technology-forward. The sector lags other verticals in IT adoption and innovation outside of medical technology, extending to cybersecurity where gaps in controls have rendered healthcare institutions vulnerable to ransomware and other types of attacks. Recently published research from risk management provider RiskRecon bears this out, showing that more than any other segment, healthcare providers are targeted in what the company terms “destructive ransomware events” in which the compromised institution’s operations are disrupted because of encryption of essential systems. The study, examining 1,454 destructive ransomware events that have occurred between 2016 and 2023, find that even if an organization has an excellent security posture itself, if there are any vulnerabilities in its supply chain, then it could be successfully targeted.

Continue reading “Healthcare Organizations Struggle to Evade Ransomware”

New Cisco Research Shows OT Security is a High Priority for Industrial Organizations

Amy Larsen DeCarlo – Principal Analyst, Security and Data Center Services

Summary Bullets:

• In a survey of more than 1,000 large industrial organizations, Cisco finds that 89% of all organizations label OT cybersecurity as either very or extremely important.

• Eighty-seven percent (87%) say that they will have a unified cybersecurity approach by 2026 for information technology (IT) and operational technology (OT) networks.

A rash of high-profile cyberattacks on industrial organizations is driving a renewed understanding of the criticality of having an effective security strategy. In its survey of decision makers from 1,000 large organizations, Cisco notes that the overwhelming majority label cybersecurity as a top priority. Many – 37% – see cybersecurity risks as a barrier to growth. Forty percent (40%) worry about the scarcity of skilled workers stalling expansion plans.

Continue reading “New Cisco Research Shows OT Security is a High Priority for Industrial Organizations”