Skip to main content
HomeTopicsagentic AI.

agentic AI.

We've curated 9942 cybersecurity statistics about Agentic AI to help you understand how autonomous AI systems are revolutionizing threat detection and response in 2025, enhancing security practices while also introducing new risks to navigate.

Showing 9781-9800 of 9942 results

26.83% of sensitive data input into GenAI tools was employee data, including payroll data, PII, and employment records.

Harmonic Security1/1/2025
Gen AISensitive information

14.88% of sensitive data input into GenAI tools was legal and finance data, such as information on Sales Pipeline Data, Investment Portfolio Data, and Mergers and Acquisitions.

Harmonic Security1/1/2025
Gen AISensitive information

6.88% of sensitive data input into GenAI tools was security policies and reports.

Harmonic Security1/1/2025
Gen AISensitive information

More board members than CISOs want CISOs to develop certain skills: Business acumen: 55% of board members vs 40% of CISOs, emotional intelligence: 45% of board members vs 35% of CISOs, Communication: 52% of board members vs 47% of CISOs.

Splunk1/1/2025
BoardCISO

49% of employees in Germany say they frequently use IT policy workarounds to “get the job done” and save time or effort.

Zivver1/1/2025

The CISA Known Exploited Vulnerabilities (KEV) Catalog recorded 1,199 KEVs as of August 31, 2024.

CISA1/1/2025

Outdated SSL and TLS encryption misconfigurations declined, with the average misconfiguration ratio per enrollee dropping from 3.8 to 2.5.

CISA1/1/2025
SSLTLS

54% of employees in Belgium say they frequently use IT policy workarounds to “get the job done” and save time or effort.

Zivver1/1/2025

53% of employees in legal services say they frequently use IT policy workarounds to “get the job done” and save time or effort.

Zivver1/1/2025

60% of employees in financial services say they frequently use IT policy workarounds to “get the job done” and save time or effort.

Zivver1/1/2025

59% of employees in healthcare say they frequently use IT policy workarounds to “get the job done” and save time or effort.

Zivver1/1/2025

Email security adoption showed strong progress, with 89% of organizations implementing DMARC (Domain-based Message Authentication, Reporting & Conformance).

CISA1/1/2025
Email securityDMARC

Email security adoption showed strong progress, with 7% of organizations implementing both DMARC and SPF (Sender Policy Framework).

CISA1/1/2025
Email securityDMARC

33% of employees say online training that uses real-life scenarios, prompts and notifications at the relevant time is the most engaging/effective email security training format

Zivver1/1/2025

Federal organizations saw a 60% decline in exploitable service instances.

CISA1/1/2025
Exploitable servicesFederal

Web browser downloads were the second most common malware delivery method to endpoints, responsible for 28% of threats in Q3 2024. This is a 10% increase compared to Q2 2024.

HP Wolf Security1/1/2025
Web browserMalware

Threats delivered by other vectors (such as removable media) to endpoints accounted for 20% of threats in Q3 2024, a 1% decrease compared to the previous quarter.

HP Wolf Security1/1/2025
Removable mediaMalware

23% of employees say classroom training is the most engaging/effective email security training format

Zivver1/1/2025

16% of employees say group training sessions over Zoom/Teams is the most engaging/effective email security training format

Zivver1/1/2025

28% of financial and banking organisations in the UK have reportedly spent between €501,000-€1,000,000 on implementing regulations such as DORA and PRA.

Rubrik1/1/2025
DORAPRA