SECURITY
SECURITY
SECURITY
Cybersecurity is the No. 1 risk facing enterprises today, and yet organizations remain dangerously unprepared.
Executives are not blind to the problem — they understand the financial exposure, the reputational stakes and the business impact of a major breach. They acknowledge gaps in their defenses and recognize the vulnerabilities that could cripple their mission-critical systems. But awareness has not translated into readiness and true business resilience remains elusive for the vast majority of firms.
Data strategies are especially important – specifically data governance, data protection and data quality. These remain essential elements of cyber resilience, but they’re only part of the equation. True business resilience requires confronting a multitude of dimensions — from application security to identity, supply chain integrity, operational continuity, infrastructure defenses and more. The uncomfortable truth is that most firms still lack the cohesive strategy, investment and execution to protect their most vital assets.
In this Breaking Analysis, we share data from a recent survey done by theCUBE Research that quantifies this reality. We’ll unpack what it means for technology buyers who must navigate escalating risks, for vendors seeking to align their solutions to market demand, and for industries where data is not just a byproduct but the lifeblood of competitive advantage. We’ll also share some Enterprise Technology Research spending data on pure-play data protection tech companies, which are each pivoting their messaging and portfolios toward cyber resilience.
But before we get into the survey data we wanted to share a brief clip from the Acquired Podcast. Recently it hosted Jamie Dimon and asked him what worries him what are the risks that keep him up at night. And Dimon mentioned some risk factors in banking like asset prices but here’s what he said was the most pressing concern:
The biggest risk to me is cyber. I mean, I think the cyber stuff, we’re very good at it. We work with all the government agencies. They would say that [we’re very good]; we spend $800 million a year or something [like that] on it. We educate people on it, we just d[everything we can]…. But you’re talking about grids and communications companies [and critical infrastructure].
Our latest survey underscores a sobering reality: Cyber remains the No. 1 business risk, yet most organizations are not fully prepared to address it. The goal of this research was to go beyond anecdote and provide a data-driven assessment of where organizations stand, what challenges they face and what best practices look like in practice.
The study was fielded in Q1 2025 with 600 qualified respondents across North America, Western Europe and Asia-Pacific. Three-quarters of the respondents came from large enterprises with more than 1,000 employees, while the remaining quarter represented midmarket firms. Importantly, the survey deliberately balanced perspectives from both information technology and cybersecurity professionals, giving us a rare A/B comparison between operational and security-centric worldviews.
We believe this distinction is critical. Security is no longer a bolt-on function; security teams are increasingly influencing infrastructure and application decisions across the enterprise. This survey allowed us to examine how that shift manifests in real-world practices.
The research was structured around the NIST Cybersecurity Framework, which remains the most widely adopted common language for resilience across industries. The objectives were fourfold:

Our research indicates that the market is at an inflection point. Organizations are keenly aware of their gaps, but translating awareness into readiness is still challenging. The juxtaposition of IT and cybersecurity respondents highlights a growing convergence of responsibilities, with security teams asserting more influence over decision-making than ever before.
In our view, this blending of perspectives will redefine how enterprises invest in infrastructure and resilience strategies over the next several years. The data from this survey provides an empirical foundation for understanding that shift.
The data paints a stark picture: Cyber incidents are not isolated anomalies — they are a recurring and costly reality for most organizations. Nearly two-thirds of respondents reported experiencing at least one cyberattack in the past 12 months that led to financial or operational harm. Alarmingly, nearly a third of enterprises were hit more than once in that same period.
This frequency underscores a central point, specifically, cybersecurity risk is no longer a discrete IT problem; it is a systemic business risk with direct impact on both top-line revenue and bottom-line profitability. The scope of disruption extends far beyond stolen data into operational paralysis, regulatory exposure, reputational damage and financial loss.
The survey asked organizations to identify all the consequences of their most recent impactful attack. The responses reveal a multidimensional crisis:

Taken together, the message is that organizations are not just facing a threat to confidentiality, but to the integrity and availability of their most critical resource — i.e. data.
Our research indicates a convergence in the infrastructure market around three historically distinct domains:
In our view, this convergence is reshaping the playbook for resilience. The bloodline of modern organizations is data and digital assets, not just physical assets. Attacks compromise the availability, trust and utility of that data, directly undermining business continuity.
Looking forward, we believe this challenge is only going to be amplified by the rise of AI, which both demands high-quality data and introduces new vectors of risk. The ability to secure, govern and recover data will become a core determinant of enterprise competitiveness in the digital economy.
The data confirms what many practitioners already suspect: No layer of the digital infrastructure is immune from attack. Adversaries are systematic. They weigh the numerator, the potential benefit of an intrusion, against the denominator, the cost and difficulty of execution. Their mission is simple: Maximize gain while minimizing effort. Defenders, therefore, must continually raise the denominator by hardening every layer. Yet the survey shows that attackers are finding weaknesses everywhere, from the systems meant to protect data, to the very artificial intelligence workloads now powering digital transformation.

The most alarming insight is that data protection infrastructure itself is the No. 1 target. At 44%, on-premises or cloud-based backups were the most frequently compromised component. This is a critical point that we can’t overemphasize. Once the backups are gone, recovery becomes nearly impossible, leaving organizations with little choice but to pay ransoms (which most often results in lost data despite the payment) or absorb devastating losses.
Our research indicates that cyber resiliency is not about protecting one component in isolation. It is about securing an interdependent system where weaknesses in one layer can compromise the whole. Two themes stand out:
In our view, the winners in this market will be the vendors that can provide comprehensive coverage across infrastructure layers while enabling interoperability. No single company can do it all, but the ones that integrate the most effectively will emerge as enterprise standards.
One of the more troubling findings from the survey is just how many security incidents are left unaddressed. Nearly half of the organizations admitted they ignore between 26% and 50% of all security alerts, even though they acknowledge these incidents could be valuable to investigate. An additional 20% concede that they dismiss more than half of their alerts. Only a small minority — roughly 12% — report ignoring fewer than 10% of alerts.
This reality highlights a systemic issue: Enterprises are drowning in alert fatigue. The sheer volume of events, compounded by false positives and the rising tide of AI-driven high-velocity attacks, makes it impractical for security operations and IT teams to chase down every signal. The result is a massive exposure hiding in plain sight — threats that are not acted upon because organizations simply don’t have the capacity to investigate them all.
Our research indicates that ignoring alerts is a double-edged sword:
We believe this is where AI becomes a necessary ally. Automation can help organizations sift through massive volumes of alerts, applying real-time classification, prioritization and pattern recognition that humans simply can’t achieve at scale. Several vendors and services providers are already delivering solutions that use AI to distinguish noise from signal and streamline response workflows.
In our view, the organizations that embrace AI-driven incident response will gain a decisive advantage. They will be better positioned to reduce ignored incidents, cut mean-time-to-detection and harden their posture against advanced threats. Conversely, those who continue to let alerts pile up unaddressed are inviting avoidable risk into their environments.
The data shows the state of the market is not good — but the tools and partners exist to change that trajectory. The challenge is not whether solutions exist; it is whether organizations will prioritize and operationalize them fast enough.

The reality of ignoring alerts highlights a systemic issue: Enterprises are drowning in alert fatigue. The sheer volume of events, compounded by false positives and the rising tide of AI-driven high-velocity attacks, makes it impractical for SecOps and IT teams to chase down every signal. The result is a massive exposure hiding in plain sight — threats that are not acted upon because organizations simply don’t have the capacity to investigate them all.
Our research indicates that ignoring alerts is a double-edged sword:
We believe this is where AI becomes a necessary ally. Automation can help organizations sift through massive volumes of alerts, applying real-time classification, prioritization and pattern recognition that humans simply can’t achieve at scale. Several vendors and services providers are already delivering solutions that use AI to distinguish noise from signal and streamline response workflows.
In our view, the organizations that embrace AI-driven incident response will gain a decisive advantage. They will be better positioned to reduce ignored incidents, cut mean-time-to-detection, and harden their posture against advanced threats. Conversely, those who continue to let alerts pile up unaddressed are inviting avoidable risk into their environments.
The data shows the state of the market is not good — but the tools and partners exist to change that trajectory. The challenge is not whether solutions exist; it is whether organizations will prioritize and operationalize them fast enough.
Perhaps the most sobering data point in the entire study is the lack of confidence organizations have in protecting their mission-critical applications. When asked what percentage of these applications are safeguarded by solutions that can guarantee an uncompromised, restorable copy of data, fewer than half of respondents could say with certainty that even 50% of their mission-critical workloads were fully protected.

The distribution is striking:
This tells us that if the worst happens, many businesses may not be able to get back on their feet quickly, if at all.
In our view, the inability to guarantee recoverability of mission-critical applications is a systemic failure. It is not simply an IT concern but a board-level issue with both operational and regulatory consequences. The risks are multidimensional:
Our research indicates the only acceptable target is to get as close as possible to 100% recoverability. Anything less introduces unacceptable levels of business risk. While achieving this is undeniably difficult, the tools exist today to close the gap. The real challenge lies in aligning people, processes and technology to enforce consistent, enterprise-wide resiliency.
We believe organizations that treat recoverability as a nonnegotiable standard will be far better positioned to weather attacks, regulatory audits and operational disruptions. Those that do not will increasingly find themselves vulnerable — not just to cybercriminals, but to competitors that can demonstrate greater resilience to customers, regulators and shareholders alike.
One of the most jarring findings in this research is the gap between data loss and data recovery outcomes following cyberattacks. The assumption many executives make — that backup and recovery investments will ensure near-complete restoration — simply does not align with reality on the ground.
On the left side of the chart, we see how much data organizations report being impacted during an attack. The most common outcomes are severe:

In other words, for a significant portion of the market, between one-fifth and nearly half of all data can be put at risk in a single attack.
On the right side of the chart, recovery rates tell a story of partial wins and persistent gaps:
Our research indicates this recovery shortfall is not the result of a single factor, but rather a convergence of issues:
In our view, this is both a crisis and an opportunity. For enterprises, the inability to recover mission-critical data at scale exposes existential risk. For vendors, this represents a massive market opening: the evolution of traditional backup into true cyber resiliency platforms. The shift will require blending high availability, cloud-native recovery, immutable storage and even traditional mediums like tape into a unified, intelligent architecture.
We believe the organizations that close this gap — those that can guarantee rapid and near-complete data recovery — will be the ones that earn the trust of boards, regulators and customers. Conversely, the current state of affairs, where the vast majority cannot claim full recoverability, is unsustainable.
When we translate percentages of lost or unrecoverable data into actual time windows, the picture becomes even more sobering. The study asked respondents to identify their actual recovery point objective, or RPO — that is, how much data in terms of time they lost after a successful cyberattack. The findings reveal the real business impact in stark terms.

Only a small fraction — about 2% — reported losses measured in seconds, which is the aspirational goal but far from the norm.
We believe this data illustrates a key point in that every lost hour is more than just a technical inconvenience — it’s a productivity killer, a revenue drain and a reputational hit. In industries such as financial services, retail or healthcare, losing even one hour of transaction data can translate into thousands or even millions of compromised records, delayed customer interactions or compliance breaches.
Christophe Bertrand framed it well: Can you imagine losing an hour of enterprise transactions? For a global business, the downstream effect is enormous. Beyond the direct operational disruption, the inability to account for or recreate lost data introduces compliance liabilities that are often more damaging than the immediate outage.
In our view, these findings reinforce three critical realities for enterprise leaders:
The gap between aspiration and reality is wide. Most organizations are still losing hours of data, and only a tiny percentage can confidently recover in near real time. This reality underscores both the urgency of the challenge and the size of the market opportunity for vendors who can deliver truly resilient, low-latency recovery solutions.
The research makes one reality painfully clear: Recovery from cyber incidents is not quick. On the left, when respondents were asked how long it would take them to fully recover from a ransomware or cyber incident, most indicated somewhere between four and 15 days. On the right, when those who had actually experienced attacks were asked how long it did take, the responses were almost identical.

This consistency between expectation and reality suggests organizations are aware of their limitations. They know recovery takes days or weeks, and most have accepted that as the current state of play.
The implications extend far beyond IT operations. When recovery consumes a week or more:
In our view, this is why cyber resilience is now a C-suite and board-level priority. Business leaders increasingly understand that resiliency is not just about getting back online — it’s about minimizing business disruption, protecting revenue and maintaining stakeholder trust.
Another critical data point from the research reinforces why paying ransoms is not a viable strategy. The vast majority of companies that paid did not recover all their data. In fact, only about one in 10 reported recovering 100% of their data.
That means ransom payments are both a poor recovery strategy and an additional financial liability. Instead, the smarter investment is in people, processes and technologies that allow organizations to recover on their own terms.
Cyber insurance enters this discussion as well. Even as premiums are rising, insurers now demand more rigorous assessments of infrastructure, people and processes before coverage is granted. In some ways, this external pressure is creating a positive forcing function — driving organizations to improve resiliency in order to qualify for coverage.
We believe the data shows that recovery is still too slow, too partial and too uncertain. The path forward is not ransom payments but building cyber resiliency into every layer — data, infrastructure and people. The firms that close the gap between expectation and reality will emerge as leaders in digital trust and continuity.
The research reveals a shift in the hierarchy of concerns for IT and cybersecurity leaders. Traditional risks such as ransomware encryption and data exfiltration remain pressing, but they have now been overtaken by cloud security (45%) and AI-driven cyberattacks (44%) as the top two issues keeping practitioners awake at night.

This marks a significant evolution in the risk landscape. Cloud has become the dominant operating model and, by extension, the first line of defense. Early on, many enterprises assumed that by entrusting their workloads to hyperscalers, they were absolved of much of the security burden. The reality is different: Hyperscalers excel at securing their infrastructure, but the responsibility for data and applications remains squarely with the customer. That shared responsibility model is now better understood, but the survey shows it is also a source of heightened anxiety.
AI emerges as both a new weapon for attackers and a potential ally for defenders. Respondents recognize the duality:
We believe this ambivalence underscores the urgency for organizations to not only defend against AI-powered threats but also adopt AI in their own resilience strategies. In a sense, enterprises must fight fire with fire.
The data also highlights the rising prominence of regulatory compliance (33%) as a top-five concern. This aligns with the growing influence of public policy and regulatory bodies in shaping enterprise security agendas. Data protection is no longer just about operations — it’s about maintaining the ability to prove compliance in the face of increasing scrutiny.
Our research indicates that the convergence of cloud responsibility, AI disruption and compliance pressure is reshaping the cybersecurity agenda. The organizations that succeed will be those that:
In our view, this dynamic is ushering in a new leadership paradigm. As the sophistication of threats grows, enterprises may increasingly look to executives with deep technology backgrounds — not just sales or finance pedigrees — to lead in traditional industries. This shift reflects the reality that cyber resilience is now inseparable from business strategy.
The bottom line is cyber remains a cat-and-mouse game where the enemy grows smarter every day. The organizations that “skate to where the puck is going” will be the ones that define best practices in this next era of cloud and AI-driven security.
The ETR spending data gives us a real-time view of how the pure-play data protection vendors are positioned. This cut excludes multisegment vendors such as Dell Technologies Inc., since the taxonomy groups them in broader storage, but it’s still a telling snapshot of the competitive landscape.
The Y-axis shows net score, a measure of spending momentum or velocity. The X-axis represents account penetration — a proxy for market presence. The red dotted line at 40% is the bar for highly elevated spending momentum.

Our research indicates three big takeaways from this data:
We believe the next big differentiator will be how vendors operationalize AI as a friend rather than a foe. Those that can embed AI into cyber resiliency, recovery and data protection workflows will separate themselves from the pack. In our view, the market is heading toward further consolidation, with ecosystem breadth and AI capabilities dictating who emerges as the long-term winners.
After walking through the survey data and spending trends, several hard truths emerge that frame both the magnitude of the challenge and the opportunities ahead.

First, cyber-resiliency is not just a technology issue — it is a business imperative. The evidence shows that data-related risks translate directly into financial loss, operational disruption, compliance failures and reputational damage. This is no longer an IT silo problem; it’s a systemic challenge that touches every part of the enterprise.
Second, most organizations remain dangerously exposed. The survey revealed that mission-critical applications are not fully recoverable in most firms, vast amounts of data are permanently lost in attacks, and recovery stretches into days or weeks. Weak links exist across every layer of the infrastructure, from backups to SaaS to AI workloads.
Third, the vendor landscape is shifting. The boundaries between backup, recovery, cybersecurity and compliance are blurring. Vendors are converging around cyber resiliency as the unifying theme. Some, like Cohesity with Veritas, are using M&A to achieve scale and credibility. Others, like Rubrik, have successfully repositioned themselves as cybersecurity-first players. Meanwhile, scale pressures and the need for AI integration are likely to accelerate consolidation across the sector.
Finally, there is no AI without cyber-resilient data. Organizations rushing to deploy AI initiatives must reckon with the quality, compliance, and recoverability of the data feeding those models. Cyber-resilient and compliant data is the prerequisite for trustworthy AI at scale. Without it, AI projects will fail to achieve ROI and could even exacerbate risk.
Based on the data, our research indicates five imperatives for enterprises and vendors alike:
The market is at an inflection point. The volume and velocity of cyberthreats, amplified by AI, are growing faster than traditional defenses can handle. Enterprises must shift from a reactive posture to a proactive, integrated resilience strategy. Vendors that can converge backup, security and governance — while embedding AI — will shape the future of this market.
In our view, the defining competitive advantage in the age of AI will not simply be who can build the most advanced models, but who can secure, govern and recover the data that fuels them. Without cyber-resilient data, there is no AI.
Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.
Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.