Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

May 8, 2026

OpenAI and Anthropic LLMs Used in Critical Infrastructure Cyber-Attack

May 7, 2026

Legacy Security Tools Are Failing Data Protection

May 7, 2026
Facebook X (Twitter) Instagram
Friday, May 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Legacy Security Tools Are Failing Data Protection
News

Legacy Security Tools Are Failing Data Protection

Team-CWDBy Team-CWDMay 7, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Traditional network security tools are inhibiting firms from adequate data security as a majority of IT leaders report that data security has never been more critical.

A new report, commissioned by Capital One Software with research conducted by Forrester, found that 72% of security professionals agreed that data security is more critical than ever, but investments in traditional network and perimeter security tools impede adequate data protection.

Without rethinking data protection, AI adoption is “impossible” argued the research. As AI agents act autonomously and bypass human oversight, the risk of unintended data exposure is heightened.

A key issue holding back organizations from adequate data protection was found to be legacy siloed solutions. Over half of respondents to the Forrester research said that they lack full visibility of vulnerabilities.

Nearly half admitted that their organizations can’t successfully compete given current data security processes.

At the time the study was conducted, in February 2026, organizations use multiple solutions to ensure their data security goals. These include:

  • Network security technologies (e.g., SASE, firewalls, VPNs, intrusion detection system/ intrusion prevention system [IDS/IPS]) at 70%
  • Identity and access management (IAM) systems at 65%
  • Vulnerability management tools at 60%

“While many organizations believe their current tools adequately protect their data, legacy solutions lack the speed, flexibility, scalability and AI readiness required today,” the study, A 2026 Snapshot on the State of Data Security, said.

Capital One Software said in a communication about the research, “Modern data security must evolve beyond static, perimeter-based approaches to address the constant movement of data across cloud and AI environments. Organizations need integrated strategies that both protect data across all environments and enable it to drive business value, including flexibility, sovereignty, and support for emerging AI use cases.”

Creating value with data must be the key motivator to protect it, and tokenization can help, the firm argued.

Two in three decision-makers don’t use tokenization solutions, underscoring opportunity, the study said. Tokenization reduces risk and expands data use so organizations can maximize their data return on investment (ROI).

According to the study, IT leaders said their security priorities over the next 12 months included:

  • Protecting enterprise data at scale (66%)
  • Improving overall security posture related to external threats (64%)
  • Taking a more proactive approach to security (63%)
  • Investing in/updating technology to support better operational efficiency and CX (62%)
  • Improving overall security posture (58%)

The research was based on 211 North American director-level and above decision-makers in IT and data and analytics who are responsible for their organization’s security and risk technology strategy.

Capital One Software is an enterprise business-to-business software firm focused on providing cloud and data management solutions for companies operating in the cloud.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCritical cPanel Authentication Vulnerability Identified — Update Your Server Immediately
Next Article OpenAI and Anthropic LLMs Used in Critical Infrastructure Cyber-Attack
Team-CWD
  • Website

Related Posts

News

What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

May 8, 2026
News

Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately

May 7, 2026
News

Cline Kanban Flaw Lets Websites Hijack AI Coding Agents

May 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Chronology of a Skype attack

February 5, 2026

What is it, and how do I get it off my device?

September 11, 2025

How to tell if a voice call is AI or not

February 23, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.