{"id":279,"date":"2025-03-05T00:29:48","date_gmt":"2025-03-05T00:29:48","guid":{"rendered":"https:\/\/www.techrepublic.com\/?p=4295233"},"modified":"2025-03-05T00:29:48","modified_gmt":"2025-03-05T00:29:48","slug":"gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently","status":"publish","type":"post","link":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/","title":{"rendered":"Gartner\u2019s 6 Cybersecurity Trends for 2025 \u2013 No Surprise That AI Features Prominently"},"content":{"rendered":"<figure id=\"attachment_4295234\" aria-describedby=\"caption-attachment-4295234\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4295234\" src=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_202500304-gartner-cybesecurity-trends-2025.jpg\" alt=\"Robotic hand interacting with virtual globe surrounded by cybersecurity trend topics.\" width=\"1400\" height=\"900\" srcset=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_202500304-gartner-cybesecurity-trends-2025.jpg 1400w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_202500304-gartner-cybesecurity-trends-2025-300x193.jpg 300w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_202500304-gartner-cybesecurity-trends-2025-1024x658.jpg 1024w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_202500304-gartner-cybesecurity-trends-2025-768x494.jpg 768w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_202500304-gartner-cybesecurity-trends-2025-50x32.jpg 50w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_202500304-gartner-cybesecurity-trends-2025-770x495.jpg 770w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_202500304-gartner-cybesecurity-trends-2025-370x238.jpg 370w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_202500304-gartner-cybesecurity-trends-2025-270x174.jpg 270w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_202500304-gartner-cybesecurity-trends-2025-740x476.jpg 740w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_202500304-gartner-cybesecurity-trends-2025-540x347.jpg 540w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_202500304-gartner-cybesecurity-trends-2025-1110x714.jpg 1110w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_202500304-gartner-cybesecurity-trends-2025-810x521.jpg 810w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\"><figcaption id=\"caption-attachment-4295234\" class=\"wp-caption-text\">Image: Murrstock\/Adobe Stock<\/figcaption><\/figure>\n<p>In line with a continuously changing threat landscape, Gartner\u2019s top cybersecurity trends for 2025 run the gamut from the impact of generative AI to tech optimization, burnout, managing machine identities, and ongoing talent shortages. Read about the firm\u2019s six cybersecurity trends for this year.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"1_The_rise_of_GenAI_will_transform_data_security_programs\"><\/span>1. The rise of GenAI will transform data security programs.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The organizational focus is shifting to prioritize protecting unstructured data, such as text, images, and video. Previously, security and financial resources have concentrated on protecting structured data such as databases.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"2_Managing_machine_identities_becomes_enterprise-wide\"><\/span>2. Managing machine identities becomes enterprise-wide.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>There is widespread use of machine accounts and credentials for physical devices and software workload, thanks to the increasing adoption of AI; this expands an organization\u2019s attack surface. Consequently, leaders must not only develop a strategy to implement robust machine identity and access management (IAM), but ensure it is a coordinated enterprise-wide effort.<\/p>\n<p>Similarly, <a href=\"https:\/\/zillasecurity.com\/research\/state-of-iga-2025-report\/\" target=\"_blank\" rel=\"noopener\">Zilla Security\u2019s 2025 State of IGA Report<\/a> found that identity governance is broken. According to the report, 84% of organizations still rely on manual identity governance and administration (IGA) processes, leaving them vulnerable to attack, inefficient, and overwhelmed by growing compliance demands.<\/p>\n<aside class=\"pinbox right\">\n<h3 class=\"heading\">Must-read security coverage<\/h3>\n<\/aside>\n<h2><span class=\"ez-toc-section\" id=\"3_AI_initiatives_will_be_reprioritized\"><\/span>3. AI initiatives will be reprioritized.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Mixed results with AI implementations are pushing security leaders to focus on narrower use cases with more measurable impacts. As implementations become more tactical, they will be aligned with AI practices and tools with existing metrics on existing initiatives, to enhance visibility of the real value of AI investments.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"4_Cybersecurity_technology_gets_optimized\"><\/span>4. Cybersecurity technology gets optimized.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Organizations use an average of 45 cybersecurity tools, according to a 2024 Gartner survey of 162 large enterprises. With more than 3,000 vendors in cybersecurity, leaders need to consolidate and validate core security controls in their toolsets to build more efficient and effective security programs.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"5_GenAI_brings_value_to_security_behavior_and_culture_programs\"><\/span>5. GenAI brings value to security behavior and culture programs.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Effective leaders recognize the value of security behavior and culture programs and the use of GenAI to reduce employee-driven cybersecurity incidents. Cultural and behavior-focused activities have increased to address cyber-risk comprehension, a strategic shift toward embedding security into the organizational culture.<\/p>\n<p><strong>SEE: <a href=\"https:\/\/www.techrepublic.com\/resource-library\/guide\/cybersecurity-awareness-training\/\">IT Leader\u2019s Guide to Cybersecurity Awareness Training<\/a> (TechRepublic Premium)<\/strong><\/p>\n<h2><span class=\"ez-toc-section\" id=\"6_Investments_in_team_wellness_initiatives\"><\/span>6. Investments in team wellness initiatives.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Security leadership and team burnout are key concerns for an industry already impacted by what Gartner calls a systemic skills shortage. This pervasive stress is due to the relentless demands associated with securing highly complex organizations in constantly changing threat, regulatory, and business environments, with limited authority, executive support, and resources.<\/p>\n<p>A <a href=\"https:\/\/www.blackfog.com\/a-quarter-of-cybersecurity-leaders-want-to-quit\/\" target=\"_blank\" rel=\"noopener\">2024 report from BlackFog<\/a> found that 24% of CISOs\/IT security decision makers want to leave their jobs for reasons including long hours and stress over the use of AI to launch cyberattacks. As a result, it will become a priority to recognize and address stress management among leaders and their teams, Gartner said.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Image: Murrstock\/Adobe Stock In line with a continuously changing threat landscape, Gartner\u2019s top cybersecurity trends for 2025 run the gamut from the impact of generative AI to tech optimization, burnout, managing machine identities, and ongoing talent shortages. Read about the firm\u2019s six cybersecurity trends for this year. 1. The rise of GenAI will transform data [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":280,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-279","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Gartner\u2019s 6 Cybersecurity Trends for 2025 \u2013 No Surprise That AI Features Prominently - TecnoArtesanos Tech Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gartner\u2019s 6 Cybersecurity Trends for 2025 \u2013 No Surprise That AI Features Prominently - TecnoArtesanos Tech Blog\" \/>\n<meta property=\"og:description\" content=\"Image: Murrstock\/Adobe Stock In line with a continuously changing threat landscape, Gartner\u2019s top cybersecurity trends for 2025 run the gamut from the impact of generative AI to tech optimization, burnout, managing machine identities, and ongoing talent shortages. Read about the firm\u2019s six cybersecurity trends for this year. 1. The rise of GenAI will transform data [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoArtesanos Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-05T00:29:48+00:00\" \/>\n<meta name=\"author\" content=\"Sergio Morales\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sergio Morales\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/\",\"name\":\"Gartner\u2019s 6 Cybersecurity Trends for 2025 \u2013 No Surprise That AI Features Prominently - TecnoArtesanos Tech Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently.jpg\",\"datePublished\":\"2025-03-05T00:29:48+00:00\",\"author\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/#primaryimage\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently.jpg\",\"contentUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently.jpg\",\"width\":1400,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.tecnoartesanos.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gartner\u2019s 6 Cybersecurity Trends for 2025 \u2013 No Surprise That AI Features Prominently\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/\",\"name\":\"TecnoArtesanos Tech Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\",\"name\":\"Sergio Morales\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"caption\":\"Sergio Morales\"},\"sameAs\":[\"https:\/\/sergiomorales.space\"],\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gartner\u2019s 6 Cybersecurity Trends for 2025 \u2013 No Surprise That AI Features Prominently - TecnoArtesanos Tech Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/","og_locale":"en_US","og_type":"article","og_title":"Gartner\u2019s 6 Cybersecurity Trends for 2025 \u2013 No Surprise That AI Features Prominently - TecnoArtesanos Tech Blog","og_description":"Image: Murrstock\/Adobe Stock In line with a continuously changing threat landscape, Gartner\u2019s top cybersecurity trends for 2025 run the gamut from the impact of generative AI to tech optimization, burnout, managing machine identities, and ongoing talent shortages. Read about the firm\u2019s six cybersecurity trends for this year. 1. The rise of GenAI will transform data [&hellip;]","og_url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/","og_site_name":"TecnoArtesanos Tech Blog","article_published_time":"2025-03-05T00:29:48+00:00","author":"Sergio Morales","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sergio Morales","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/","url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/","name":"Gartner\u2019s 6 Cybersecurity Trends for 2025 \u2013 No Surprise That AI Features Prominently - TecnoArtesanos Tech Blog","isPartOf":{"@id":"https:\/\/blog.tecnoartesanos.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/#primaryimage"},"image":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently.jpg","datePublished":"2025-03-05T00:29:48+00:00","author":{"@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807"},"breadcrumb":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/#primaryimage","url":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently.jpg","contentUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently.jpg","width":1400,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/05\/gartners-6-cybersecurity-trends-for-2025-no-surprise-that-ai-features-prominently\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.tecnoartesanos.com\/"},{"@type":"ListItem","position":2,"name":"Gartner\u2019s 6 Cybersecurity Trends for 2025 \u2013 No Surprise That AI Features Prominently"}]},{"@type":"WebSite","@id":"https:\/\/blog.tecnoartesanos.com\/#website","url":"https:\/\/blog.tecnoartesanos.com\/","name":"TecnoArtesanos Tech Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807","name":"Sergio Morales","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","caption":"Sergio Morales"},"sameAs":["https:\/\/sergiomorales.space"],"url":"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/comments?post=279"}],"version-history":[{"count":0,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/279\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media\/280"}],"wp:attachment":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media?parent=279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/categories?post=279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/tags?post=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}