SUBSCRIBE
Tech Journal Now
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Reading: the data challenge – Computerworld
Share
Tech Journal NowTech Journal Now
Font ResizerAa
  • News
  • Reviews
  • Guides
  • AI
  • Best Buy
  • Games
  • Software
Search
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Journal Now > AI > the data challenge – Computerworld
AI

the data challenge – Computerworld

News Room
Last updated: December 8, 2025 10:01 am
News Room
Share
5 Min Read
SHARE

The tidal wave of data

Data is undoubtedly a key asset today, but all it takes is a breach to turn it into a dreaded liability. With more data generated than ever, organizations have a hard time tracking and storing it. Approximately 402.74 million terabytes of data are produced each day on average. To put this into perspective, this amount of storage can hold roughly 100 billion high-definition movies.

Does more data mean more risks?

With GenAI in play, data generation has skyrocketed further. However, the lack of data security measures leads to data breaches, often causing operational and financial disruptions, and also inviting regulatory intervention. There are many examples of weak security policies leading to breaches. Change Healthcare, a US-based technology company, suffered a ransomware attack that caused a data breach affecting 190 million US citizens.

Such examples compel regulatory bodies to further flex their muscles. Approximately 79% of countries (155 out of 194) have some form of data protection and privacy legislation in place.

shutterstock/Gorodenkoff

The situation demands data security measures

Solutions such as data security posture management (DSPM) enable real-time discovery and classification of sensitive data across multi-cloud and on-premises environments, reducing the risk of exposure.

AI-driven DSPM solution automates risk assessments, detect anomalous data movements, and enforce security policies dynamically, ensuring proactive protection against breaches. It also enhances threat detection, minimizes false positives, and accelerates incident response, making data security more efficient and scalable.

Mitigating potential cyber attacks

Data security solutions identify unusual data movement and exfiltration attempts early, potentially mitigating the breach’s scale. Ensuring visibility and control over structured and unstructured data, DSPM mitigates risks like shadow data exposure, misconfigurations, and excessive permissions.

In Change Healthcare’s case, a DSPM solution could have significantly reduced the impact. It could have identified excessive permissions, unsecured sensitive data, and risky access patterns across Change Healthcare’s cloud and on-premises environments.

Organizations can deploy such solutions in cloud security, data governance, compliance enforcement, and insider threat detection. Industries such as healthcare, finance, and retail use DSPM to maintain regulatory compliance (eg HIPAA, PCI-DSS, GDPR) by enforcing consistent security policies across different data repositories.

Data security is a boardroom-level concern

As cybersecurity threats grow and data security becomes a priority, CISOs are increasingly investing in solutions like DSPM. According to Gartner, about 20% of organizations will adopt DSPM technology to address growing data security and privacy challenges.

Businesses are estimated to have 55-80% dark data, which includes hidden, unmanaged, and unutilized data. Beyond security risks, shadow IT is a major contributor to IT overspending. Companies waste as much as 30-40% on redundant tools and unused licenses. Cumulatively, this represents a billion-dollar problem for the industry.

DSPM solution also addresses the challenges of shadow IT and unknown data by scanning and identifying unmonitored, duplicated, and unclassified data across environments. It provides teams with full visibility into data locations and handling practices.

Additionally, it flags unprotected assets, identifies redundant SaaS tools, and eliminates cost inefficiencies and compliance risks. By offering real-time insights into shadow data and unsanctioned applications, DSPM enables security teams to regain control, enforce policies, and prevent financial losses due to duplication and compliance failures.

DSPM does what every CISO needs

In conclusion, the DSPM solution:

  • Finds sensitive data automatically
  • Maps identity access to that data
  • Detects misconfigurations and exposure
  • Highlights risky sharing and SaaS data flows
  • Provides a data-centric risk view for governance, compliance, and threat reduction

T-Systems helps enterprises operationalize DSPM, not as another dashboard, but as a managed program. We deploy best-in-class DSPM platforms (CrowdStrike, Palo Alto Networks), integrate them with Identity Access Management, Security Information Event Management, Cloud Security Posture Management, and API security controls, and run continuous monitoring and risk reduction through our global Managed Security Service Provider model.

In a landscape where data is everywhere, T-Systems ensures your security is everywhere too, starting at the layer that matters most. Reduce breach likelihood and build compliance with T-Systems security solutions today.

Want to secure AI initiatives? Start with this e-book.

Need to rethink comprehensive security? Check out this guide.

Read the full article here

You Might Also Like

Will Google get smart glasses right this time? – Computerworld

Apple hits its Game of Thrones era – Computerworld

Fixes released for a serious Microsoft Office zero-day flaw – Computerworld

Google may soon let users change their Gmail address – Computerworld

What exactly is an AI factory?

Share This Article
Facebook Twitter Email Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Trending Stories

Games

MindsEye studio boss threatens legal action against YouTuber as co-CEO Leslie Benzies denies Epstein allegations: ‘I have never met Jeffrey Epstein, nor have I ever visited his island’

February 4, 2026
Games

Grand Theft Auto 6 ‘launch marketing’ will begin this summer as the November release date remains on track

February 4, 2026
Games

Anime action RPG studio Pahdo Labs shuts down despite accruing $17.5M in funding: ‘We believed making a demo of a familiar but new game would be our best shot’

February 4, 2026
News

Tech Moves: Tableau CEO steps down; Microsoft taps new executive VPs; Avanade’s new CEO

February 4, 2026
Games

Good news, Stardew Valley enthusiasts: the 1.7 update will make children ‘a little more interesting’ and add two new marriage candidates

February 4, 2026
News

Washington’s ‘millionaires tax’ targets top earners as tech leaders warn of startup fallout

February 4, 2026

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Follow US on Social Media

Facebook Youtube Steam Twitch Unity

2024 © Prices.com LLC. All Rights Reserved.

Tech Journal Now

Quick Links

  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?