Global Current News
  • News
  • Finance
  • Technology
  • Automotive
  • Energy
  • Cloud & Infrastructure
  • Data & Analytics
  • Cybersecurity
  • Public Safety
  • News
  • Finance
  • Technology
  • Automotive
  • Energy
  • Cloud & Infrastructure
  • Data & Analytics
  • Cybersecurity
  • Public Safety
No Result
View All Result
Global Current News
No Result
View All Result

Zero trust security delivers benefits, but AI-driven defenses still lag

by Edwin O.
October 14, 2025
in Cybersecurity
Zero Trust security

Oracle warns customers of extortion attempts linked to hacker campaign

Use Google passkeys (and move toward password-free sign-in) on your account

Ooredoo expands cybersecurity offerings across Middle Eastern markets

The first, deeper world cybersecurity report released by DXC Technology and Microsoft demonstrates that, despite the fact that 83% of the organizations that have implemented Zero Trust models have been successful at cutting down on their security incidents, the adoption of Artificial Intelligence (AI)-based security tools remains extremely low. The study involving over 100 cybersecurity specialists on four continents indicates that there is a phenomenal disparity between achievement in the application of Zero Trust and AI security.

Zero Trust adoption proves highly effective in reducing incidents

Companies that are deploying Zero Trust systems are achieving colossal success in terms of the mitigation of security breaches and associated recovery expenses. It is no longer a best practice but a vital security standard, with 83 percent of the adopting organizations recording quantifiable gains in security posture and operational efficiency.

The study reveals that the comprehensive nature of security provided by Zero Trust in the identity, devices, networks, applications, and data categories is comprehensive and can protect against contemporary cyber threats. Over half of the organizations noted that they were caught off-guard as to the value Zero Trust brought to the table in enhancing the user experience in parallel with security, that is, the benefits outside of the traditional security metrics.

The legacy systems give the largest implementation issues

Although the advantages have been invested in, the challenge of the adoption of Zero Trust in 66% of organizations is mostly the legacy systems. Most of these outdated infrastructures do not tend to be flexible and capable of integration required to enable seamless implementation of the Zero Trust system, and complex workarounds or expensive system modernizations are the only options available.

The use of AI security equipment is extremely poor

Although cyber threats increasingly employ more artificial intelligence to overcome traditional cyber defenses, organizations have not changed to incorporate artificial intelligence in security mechanisms as swiftly. The wide disparity in the current state of cybersecurity is that 30% of the surveyed organizations use AI-based authentication tools only.

This extreme contrast then highlights the value of Zero Trust frameworks that have already been demonstrated, as well as the immense potential of AI to offer a more responsive and dynamic defense against the current applied cyber threats environment. Since AI grants attackers new opportunities to exploit vulnerabilities, organizations should implement AI-driven defensive solutions at the speed of possible.

As an Ongoing Process, CI Ushers in Zero Trust Progress

According to the report, the most common reason for enterprises to continuously enhance Zero Trust policies and practices is a new threat occurring in 72 percent of enterprises. Companies understand that the implementation of Zero Trust is not a single process but an ongoing process that requires a cultural shift, constant monitoring, and solid cooperation with any technology vendor.

The successful implementation depends on the strategic partnerships

Cybersecurity specialists of DXC point out that the implementation of Zero Trust by organizations must be done in phases, and it is suggested that organizations begin with identity management via the partnership of trusted entities to integrate, optimize, and scale the management when working towards the implementation of Zero Trust. According to Microsoft, Alex Simons, creating solutions of the Zero Trust in combination with the current IT environments enables enhanced tightness of integration and, at the same time, facilitates the work.

Those organizations that have been successful at adopting zero trust frameworks have experienced massive incident and cost reductions, yet 30% of them use AI-enabled authentication solutions. This disjuncture is a massive chance and a grave weakness of enhanced security. This will involve strategic alliances, the stage plan of institutionalization, continued improvement, and commitment of customers in a dynamic threat environment.

Global Current News

ยฉ 2025 by Global Current News

  • Contact
  • Legal notice

No Result
View All Result
  • News
  • Finance
  • Technology
  • Automotive
  • Energy
  • Cloud & Infrastructure
  • Data & Analytics
  • Cybersecurity
  • Public Safety

ยฉ 2025 by Global Current News