Security | IBM

1 min read Original article ↗

The Cost of a Data Breach

What’s in the 2025 report—and what to know about security

2025 Cost of a Data Breach: AI risks, shadow AI and solutions

3D render of multiple flat shapes with the "THINK" logo lined up

Join over 100,000 subscribers

Receive insights, research and expert views on AI, security, automation and data in the Think Newsletter.

Subscribe today

Security Intelligence Podcast

Listen to the latest cybersecurity news and in-depth conversations with practitioners in the field.

Watch the latest episode

Videos

2025 Cost of a Data Breach: AI risks, shadow AI and solutions

Jeff Crume breaks down key findings from the IBM 2025 Cost of a Data Breach report, exploring AI security risks, shadow AI, phishing attacks and IAM strategies.

The anatomy of an att&ck

Understand the MITRE ATT&CK in terms of “tactics, techniques and procedures (TTPs)”, and “people, process and technology (PPTs)”, and how to defend against attacks.

What Is SIEM?

Sort through alerts with Jaqueline Lehmann using a SIEM system to correlate data from multiple sources and find accurate, high-fidelity alerts.

Social engineering: How bad guys hack users

Watch how Jeff Crume, IBM Distinguished Engineer, describes the many methods that bad guys/hackers use that you should know about so you can protect yourself.

Never miss an update

Illustration of an eye with connecting lines to data