comforte

As 2025 begins, IT security and business leaders will be braced for another challenging year ahead. In the long-term, economic uncertainty and geopolitical instability seem set to continue, creating the conditions in which threat actors thrive. They will increasingly have the tools at their disposal to launch more impactful cyber-attacks in greater numbers. In the meantime, boards will want to push ahead with important digital transformation initiatives—potentially expanding their attack surfaces in the process.

At the centre of it all sits corporate data: the critical driver of competitive advantage, operational efficiency and improved decision-making. And the enterprise asset that most threat actors want to get their hands on. With this in mind, here are five tips to help inform data security strategy over the coming year.

1) Get your compliance house in order

It’s been a big year for new regulatory rules, and 2025 will be no different. We’ll see the compliance deadline for the EU’s Digital Operational Resilience Act (DORA) land in January, while many organisations will still be rolling out their NIS 2 plans, and tweaking their PCI DSS 4.0 strategies. The most important point to remember throughout is that compliance should never be a one-off exercise. Plans are most effective when they follow a circular process of risk assessment, implementation, auditing and review. By focusing on data-centric security, organisations may find that they can actually reduce the cost and scope of some compliance programs.

2) Take steps to mitigate supply chain risk

The number of breached US organisations impacted by supply chain attacks has risen an astonishing 2,600 percentage points since 2018. Last year alone there were over 2,700 entities affected, victimising more than 54 million individuals. As digital and traditional supply chains continue to grow in 2025, organisations need to get better at mapping their dependencies and data flows and auditing their suppliers. By protecting what’s most important, the data itself, many potential supply chain risks can be mitigated.

3) Harness the power of AI securely

AI has been the tech story of the past two years. And with the technology predicted to generate up to $23 trillion globally by 2040, ambitious enterprises will be keen to exploit new business opportunities this coming year. But the data on which value-enhancing projects are built will increasingly become a target in its own right—for outright information theft or possible data poisoning attacks designed to alter and/or sabotage AI output.

That’s why the data used in such projects must be protected from the outset, but in a manner that means it can still be used. Tokenisation, for example, preserves utility so that data can be fed into cloud-based analytics tools, without compromising on security.

4) Plan your Zero Trust data security strategy

Zero Trust should be on everyone’s radar by now. According to Gartner, 63% of global organisations now have a fully or partially implemented strategy. However, for most, this represents less than half of their environment. There’s no denying the fact that Zero Trust requires significant time, money and effort. But when it comes to data security—a foundational part of any Zero Trust approach—there are new resources to hand. A US Federal Zero Trust Data Security Guide could provide a blueprint for success in 2025.

5) Shine a light on your clouds 

Cloud adoption will continue to grow in 2025. Gartner predicts annual growth of over 20% to reach worldwide spending of nearly $825bn next year. But too often, these environments are a black box. That’s bad news when threat actors are circling, and misconfigurations often leave data stores exposed. Put simply, organisations can’t protect what they can’t see. So, enterprise IT security leaders must search out data protection platforms capable of shining a light on all parts of the organisation, including third-party cloud environments, so they can continually discover, classify and secure sensitive data, wherever it is

Learn how to discover, classify, and protect
all sensitive data.

Click the button below to download the solution brief for our Data Security Platform:

Download Solution Brief

Data Security in 2025: Five Steps to Strategic Success in 2025

Data Security in 2025: Five Steps to Strategic Success in 2025

As 2025 begins, IT security and business leaders will be braced for another challenging year ahead. In the long-term, economic uncertainty and geopolitical instability seem set to continue, creating the conditions in which threat actors thrive. They will increasingly have the tools at their disposal to launch more impactful cyber-attacks in greater numbers. In the meantime, boards will want to push ahead with important digital transformation initiatives—potentially expanding their attack surfaces in the process.

Read more
comforte-c2Picture3

Multi-Factor Authentication on HPE NonStop from comforte

comforte made a significant announcement at the NonStop Technical Boot Camp (TBC) in Monterey recently, unveiling its innovative multi-factor authentication (MFA) solution tailored for HPE NonStop systems. The launch highlighted comforte’s commitment to enhancing security for industries reliant on NonStop platforms, such as banking and finance, by introducing a solution that bolsters authentication measures without compromising performance.

The solution integrates seamlessly into existing infrastructures, offering features like TOTP support and transparent integration with Pathway applications.…

Read more
comforte AG_ACI Partnership

Accelerating the Journey to PCI DSS 4.0 Compliance with ACI Worldwide

Regulatory compliance is a fact of life for any business. And for those that accept, process, store or transmit credit card information, that means ensuring they meet the exacting requirements of PCI DSS. The card industry data security standard is two decades old this year, and its latest iteration promises a step change in how organizations are required to manage and secure their cardholder data environments (CDEs).…

Read more

Cybersecurity in the Boardroom: A Strategic Driver for Growth

Cybersecurity has struggled for many years to make it onto the boardroom agenda. The perception of it as a purely technology function with limited strategic importance has led many organizations to take a short-term, check-box approach to managing cyber risk. This grossly undervalues the role cyber can and should have. In fact, one 2023 study finds that half (51%) of global business decision makers (BDMs) still consider “it a necessary cost but not a revenue contributor,” while 38% see it as a barrier rather than a business enabler.…

Read more

What Happens Next? Five Data Protection Predictions for 2024

It’s been another year full of incidents. But 2024 has plenty in store for IT and business leaders. As organizations continue to adapt to economic, political and business uncertainty, the value of effective data protection will never be so obvious. Regulatory and technological change promises to make it another challenging year for industry professionals.

So what might they expect? Here are five suggestions:

1.

Read more