Close Menu
  • Home
  • Psychology
  • Dating
    • Relationship
  • Spirituality
    • Manifestation
  • Health
    • Fitness
  • Lifestyle
  • Family
  • Food
  • Travel
  • More
    • Business
    • Education
    • Technology
What's Hot

Ideas We Aren’t Ready to Understand—Yet

March 14, 2026

Google Android Kernel Upgrade Boosts Phone Performance

March 14, 2026

Why a Formal ADHD Diagnosis Matters for Parents

March 14, 2026
Facebook X (Twitter) Pinterest YouTube
Facebook X (Twitter) Pinterest YouTube
Mind Fortunes
Subscribe
  • Home
  • Psychology
  • Dating
    • Relationship
  • Spirituality
    • Manifestation
  • Health
    • Fitness
  • Lifestyle
  • Family
  • Food
  • Travel
  • More
    • Business
    • Education
    • Technology
Mind Fortunes
Home»Technology»Shadow AI adds $670K to breach costs while 97% of enterprises skip basic access controls, IBM reports
Technology

Shadow AI adds $670K to breach costs while 97% of enterprises skip basic access controls, IBM reports

November 5, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
Shadow AI adds $670K to breach costs while 97% of enterprises skip basic access controls, IBM reports
Share
Facebook Twitter LinkedIn Pinterest Email

Shadow AI poses a significant threat to organizations, with IBM’s latest report revealing that breaches involving unauthorized employee use of AI tools cost an average of $4.63 million, which is 16% higher than the global average. The rapid adoption of AI is outpacing security oversight, as shown by the research based on interviews with 3,470 organizations that suffered breaches.

The report highlights the lack of proper AI access controls, with 97% of breached organizations lacking these controls. Additionally, 8% of organizations were unsure if they had been compromised through AI systems. This gap between AI adoption and oversight is being exploited by threat actors, as stated by Suja Viswesan, Vice President of Security and Runtime Products at IBM.

Shadow AI incidents primarily result in compromised data and disruptions to daily operations, with customers’ personally identifiable information being compromised in 65% of cases. Governance is a significant weakness in AI security, with 63% of breached organizations lacking AI governance policies.

Itamar Golan, CEO of Prompt Security, likens Shadow AI to doping in the Tour de France, emphasizing the desire for an edge without understanding the long-term consequences. Supply chains are the preferred attack vectors for AI security incidents, with compromised apps, APIs, and plug-ins being common causes.

The proliferation of weaponized AI poses a growing threat, with attackers using AI for phishing and deepfake attacks. Fine-tuned language models like FraudGPT and GhostGPT are purpose-built for attack strategies, with attackers using AI to blend into normal network traffic, making detection challenging.

Governance is a weakness that adversaries exploit, with many organizations lacking essential policies and processes to reduce AI-related risks. DevSecOps emerges as a top factor in reducing breach costs, saving organizations an average of $227,192.

See also  Microsoft says ungoverned AI agents could become corporate 'double agents.' Its fix costs $99 a month.

Despite the challenges posed by weaponized AI, organizations leveraging AI and automation are saving $1.9 million per breach and resolving incidents 80 days faster. Security teams using AI extensively are able to detect breaches earlier and contain them more efficiently.

The U.S. cybersecurity landscape faces record-high costs compared to global averages, highlighting the need for a fundamental rethinking of cyber resilience strategies. IBM’s report underscores the critical importance of governance in managing AI-related risks and emphasizes the need for organizations to accelerate security AI adoption.

In conclusion, organizations must prioritize implementing AI governance, gaining visibility into shadow AI, and accelerating security AI adoption to mitigate the risks posed by Shadow AI. As attackers continue to weaponize AI, organizations that effectively manage AI risks will thrive in this new landscape where machines battle machines.

670K access Adds basic breach Controls costs Enterprises IBM reports Shadow skip
Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
Previous ArticleBillions of Federal Dollars Are Spent on Teacher Training. Less Than Half Goes to Tech PD
Next Article Charting a New Course for Aviation in Landmark Industry Report | News

Related Posts

Google Android Kernel Upgrade Boosts Phone Performance

March 14, 2026

Google Unveils Gemini-Powered Groundsource for Flash Flood Prediction

March 14, 2026

Everything You Need to Know to Stay Ahead

March 13, 2026

Before quantum computing arrives, this startup wants enterprises already running on it

March 13, 2026

Comments are closed.

Our Picks

NBCU Academy’s The Edit | Teacher Picks

March 7, 2026

What SEL Skills Do High School Graduates Need Most? Report Lists Top Picks

March 8, 2026
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Don't Miss
Psychology

Ideas We Aren’t Ready to Understand—Yet

March 14, 20260

The Power of Embracing Ideas You Don’t Yet Understand Introduction “The real journey of discovery…

Google Android Kernel Upgrade Boosts Phone Performance

March 14, 2026

Why a Formal ADHD Diagnosis Matters for Parents

March 14, 2026

The anti-itinerary safari – A Luxury Travel Blog

March 14, 2026
About Us
About Us

Explore blogs on mind, spirituality, health, and travel. Find balance, wellness tips, inner peace, and inspiring journeys to nurture your body, mind, and soul.

We're accepting new partnerships right now.

Our Picks

Ideas We Aren’t Ready to Understand—Yet

March 14, 2026

Google Android Kernel Upgrade Boosts Phone Performance

March 14, 2026

Why a Formal ADHD Diagnosis Matters for Parents

March 14, 2026

Subscribe to Updates

Awaken Your Mind, Nourish Your Soul — Join Our Journey Today!

Facebook X (Twitter) Pinterest YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 mindfortunes.org - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.