Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Data breach victims increased by 490% since the first half of 2023

By Jordyn Alger, Managing Editor
Silhouette of woman at computer

Image via Unsplash

July 24, 2024

The Identity Theft Resource Center (ITRC) has released a report analyzing H1 data breach incidents for 2024. According to the report, there was a 490% rise in data breach victims in H1 of 2024 compared to H1 of 2023. Yet, Q2 had 732 publicly reported data breaches, which represents a 12% decrease from Q1. 

Security leaders weigh in 

Stephen Kowski, Field CTO at SlashNext: 

“The surge in breach victims is likely due to several large-scale breaches of major companies with extensive customer databases. Increased remote work has expanded the attack surface for many organizations. Additionally, more sophisticated attack methods powered by AI are allowing cybercriminals to breach defenses at an accelerated rate.

“Organizations should implement AI-powered controls across all messaging and communication channels to stop initial credential harvesting attempts. A zero trust security model with multi-factor authentication is crucial. While regular security awareness training is important, it’s insufficient alone against sophisticated phishing and social engineering attacks. Robust, AI-driven email and messaging security that can detect and block advanced threats in real-time is essential to mitigate large-scale data breach risks.

“Employee training plays a complementary role in preventing data breaches. While it can’t stand alone, well-designed security awareness programs help staff recognize evolving threats and reinforce best practices. Training should be frequent, engaging and include simulated phishing tests. However, human vigilance has limits. To truly mitigate risks, organizations must combine training with advanced technological defenses, particularly AI-powered controls across all communication channels. This dual approach addresses both the human factor and the sophisticated nature of modern cyber threats.

“Organizations need to adopt a proactive, multi-layered approach to security that combines technology, processes and people. This includes implementing advanced threat detection systems, regularly updating incident response plans and fostering a culture of security awareness. Transparency and quick response in the event of a breach are also crucial for maintaining consumer trust.”

Chris Morales, Chief Information Security Officer at Netenrich:

“Today, we’re seeing a rise in sophisticated, AI-enhanced attacks. Advanced persistent threats, supply chain vulnerabilities and highly convincing social engineering tactics are becoming more prevalent. Attackers leverage machine learning to create targeted phishing campaigns and even deepfakes for business email compromise. This evolution underscores the need for security operations to become more data-driven and adaptive.

“When it comes to the surge in breach victims, several factors are at play: expanded attack surfaces due to remote work and cloud adoption, more sophisticated ransomware attacks often involving data exfiltration and the democratization of attack tools through ransomware-as-a-service. We’re also seeing larger-scale breaches affecting millions of users at once. This surge not only highlights the urgent need for a paradigm shift in security operations, but it also underscores the need for immediate action, moving towards more proactive, data-driven strategies.

“Organizations should implement comprehensive SecOps solutions that provide holistic visibility across their IT environment. Leveraging advanced data engineering and AI within these frameworks can enable continuous, adaptive threat detection and response. Adopting a “zero-trust architecture,” which means that no user or system is by default trusted, even if they are inside the corporate network, is a crucial strategy. This approach, along with regular vulnerability assessments and employee cybersecurity training, is vital. The key is to build a continuous feedback loop in security operations, constantly learning and adapting to the evolving threat landscape.

“Organizations need to embrace continuous improvement and adaptation in their cybersecurity strategies. This involves regularly reassessing risk postures, investing in threat intelligence capabilities and fostering a culture of security awareness. The future lies in more autonomous, data-driven security operations, using AI and automation to handle routine tasks while freeing human analysts for strategic issues. By aligning people, processes and technology around a data-centric approach, organizations can significantly enhance their security posture and maintain customer trust in an ever-changing threat landscape, emphasizing the need for a holistic approach to cybersecurity.”

Justin Kestelyn, Head of Hacker Community Marketing at Bugcrowd:

“At the highest level, attack vectors are trending toward becoming more diversified, targeted and sophisticated — which is a reflection of the increasing number of well-financed and well-organized adversaries in recent years; malicious hacking is now big business. To be more specific, (1) phishing and other social engineering attacks have become extremely personalized, convincing, and effective; (2) adversaries have learned that attacking adjacent, relatively unhardened targets (e.g. in supply chain partners) offer productive lateral movement opportunities; and (3) generative AI is becoming a useful tool to help amplify existing techniques (e.g., for personalizing phishing attacks).

“The rise in breach victims is due to a combination of better technique (as described above) and more complex attack surface. With respect to the latter, companies have become very good at integrating public cloud providers in everything they do, using code written by third parties (e.g. open source libraries), and integrating data from multiple sources. That leads to an increase in attack surface complexity and security gaps, all of which are catnip for adversaries.

“The most urgent thing organizations can do is to become proactive about cybersecurity by first admitting and assuming that (1) vulnerabilities are inevitable, and (2) that adversaries are inspecting your attack surface for them every day. Leading with those assumptions will transform how cybersecurity is defined and done in your organization.

“The best way to prepare is to have access to solutions that evolve along with that landscape — for all their benefits, automated solutions are built to fight yesterday’s battles, not to handle emerging ones such as AI safety and security vulnerabilities. That’s where access to human ingenuity enters the chat, because nobody has built a tool that adapts to (and anticipates) the environment as quickly as the human mind. This approach is also critical for maintaining consumer trust because it signifies a commitment to doing everything proactively possible to protect their interests.”

KEYWORDS: data breach data security information security security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Paper airplane image against brick wall

    Email attacks rose by 293% compared to the first half of 2023

    See More
  • Red rotary phone

    Vishing attacks increased by 442% in the second half of 2024

    See More
  • Gavel and block

    Data breach costs: Geico and Travelers fined $11.3M by New York State

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing