{"id":92813,"date":"2025-08-18T21:39:10","date_gmt":"2025-08-18T21:39:10","guid":{"rendered":"https:\/\/www.newsbeep.com\/us\/92813\/"},"modified":"2025-08-18T21:39:10","modified_gmt":"2025-08-18T21:39:10","slug":"ibm-finds-improper-controls-in-97-of-ai-related-data-breaches","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/us\/92813\/","title":{"rendered":"IBM Finds Improper Controls in 97% of AI-Related Data Breaches"},"content":{"rendered":"<p style=\"font-weight: 400;\">Recent\u00a0<a href=\"https:\/\/www.ibm.com\/us-en\" target=\"_blank\" rel=\"noopener nofollow\">IBM<\/a>\u00a0research finds an \u201cAI oversight gap\u201d among organizations that had experienced data breaches.<\/p>\n<p style=\"font-weight: 400;\">\u201cConsider this: a staggering 97% of breached organizations that experienced an AI-related security incident say they lacked proper AI access controls,\u201d the company said in\u00a0<a href=\"https:\/\/www.ibm.com\/think\/x-force\/2025-cost-of-a-data-breach-navigating-ai\" target=\"_blank\" rel=\"noopener nofollow\">promoting<\/a>\u00a0findings from its Cost of a Data Breach Report.<\/p>\n<p style=\"font-weight: 400;\">In addition, 63% of the surveyed organizations said they had no artificial intelligence (AI) governance policies in place to manage AI or keep workers from using \u201cshadow AI,\u201d IBM said. The findings were released in late July and flagged Monday (Aug. 18) in a\u00a0<a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/ibm-2025-cost-of-data-breach-report-centers-on-mounting-ai-security-debt\/\" target=\"_blank\" rel=\"noopener nofollow\">report<\/a>\u00a0by CPO Magazine.<\/p>\n<p style=\"font-weight: 400;\">\u201cThis AI oversight gap is carrying heavy financial and operational costs,\u201d the company\u2019s announcement added. \u201cThe report shows that having a high level of shadow AI\u2014where workers download or use unapproved internet-based AI tools\u2014added an extra $670,000 to the global average breach cost.\u201d<\/p>\n<p style=\"font-weight: 400;\">In addition, AI-related breaches carried a ripple effect, leading to \u201cbroad data compromise and operational disruption,\u201d which can keep organizations from processing sales orders, delivering customer service and managing supply chains.<\/p>\n<p style=\"font-weight: 400;\">The report also contains some positive news: average\u00a0<a href=\"https:\/\/www.pymnts.com\/cybersecurity\/2025\/financial-services-most-breached-industry-amid-data-leak-surge\/\" target=\"_blank\" rel=\"noopener nofollow\">global data breach costs<\/a>\u00a0have declined for the first time in five years, from $4.88 million to $4.44 million, a 9% decrease.<\/p>\n<p style=\"font-weight: 400;\">\u201cThe catalyst? Faster breach containment driven by AI-powered defenses,\u201d the company said, with organizations able to identify and contain a breach within a mean time of 241 days, the lowest that figure has been in nine years.<\/p>\n<p style=\"font-weight: 400;\">Research by PYMNTS Intelligence has found that a growing number of companies are\u00a0<a href=\"https:\/\/www.pymnts.com\/cybersecurity\/2025\/55-of-companies-have-implemented-ai-powered-cybersecurity\/\" target=\"_blank\" rel=\"noopener nofollow\">implementing AI-powered tools<\/a> for cybersecurity protections.<\/p>\n<p style=\"font-weight: 400;\">The share of chief operating officers (COOs) who said that their companies had implemented such measures was at 55% in August of last year,\u00a0<a href=\"https:\/\/www.pymnts.com\/study_posts\/coos-leverage-genai-to-reduce-data-security-losses\/\" target=\"_blank\" rel=\"noopener nofollow\">compared to 17% in May<\/a>.<\/p>\n<p style=\"font-weight: 400;\">Those COOs, PYMNTS wrote earlier this year, \u201care moving to proactive, AI-driven frameworks \u2014 and away from reactive security approaches \u2014 because the new AI-based systems can identify fraudulent activities, detect anomalies and provide real-time threat assessments.\u201d<\/p>\n<p style=\"font-weight: 400;\">More recently, PYMNTS examined the use of\u00a0<a href=\"https:\/\/www.pymnts.com\/news\/artificial-intelligence\/2025\/agentic-ai-turns-enterprise-cybersecurity-into-machine-battle\/\" target=\"_blank\" rel=\"noopener nofollow\">agentic AI<\/a>\u00a0in cybersecurity efforts, and the risks that come with it.<\/p>\n<p style=\"font-weight: 400;\">Those systems, by definition, operate independently, thus introducing new challenges for governance and compliance. Who\u2019s at fault if an AI mistakenly flags a critical system and shuts it down? What happens if the AI fails to spot a breach?<\/p>\n<p style=\"font-weight: 400;\">\u201cThis isn\u2019t a technical upgrade; it\u2019s a governance revolution,\u201d\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/kathrynmccall\" target=\"_blank\" rel=\"noopener nofollow\">Kathryn McCall<\/a>, chief legal and compliance officer at\u00a0<a href=\"https:\/\/www.trustly.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Trustly<\/a>, said in a June\u00a0<a href=\"https:\/\/www.pymnts.com\/news\/artificial-intelligence\/2025\/growth-of-ai-agents-put-corporate-controls-to-the-test\/\" target=\"_blank\" rel=\"noopener nofollow\">interview<\/a>\u00a0with PYMNTS.<\/p>\n","protected":false},"excerpt":{"rendered":"Recent\u00a0IBM\u00a0research finds an \u201cAI oversight gap\u201d among organizations that had experienced data breaches. \u201cConsider this: a staggering 97%&hellip;\n","protected":false},"author":2,"featured_media":92814,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[182,181,507,11201,558,3,3300,7270,74,3301],"class_list":{"0":"post-92813","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-artificialintelligence","11":"tag-data-breaches","12":"tag-ibm","13":"tag-news","14":"tag-pymnts-news","15":"tag-security","16":"tag-technology","17":"tag-whats-hot"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/92813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/comments?post=92813"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/92813\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media\/92814"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media?parent=92813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/categories?post=92813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/tags?post=92813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}