{"id":1743,"date":"2025-08-07T10:30:02","date_gmt":"2025-08-07T10:30:02","guid":{"rendered":"http:\/\/www.xinetica.com\/?p=1743"},"modified":"2025-08-07T14:28:35","modified_gmt":"2025-08-07T14:28:35","slug":"shadow-ai-emerging-as-a-major-cyber-threat-warns-consilium","status":"publish","type":"post","link":"http:\/\/www.xinetica.com\/index.php\/2025\/08\/07\/shadow-ai-emerging-as-a-major-cyber-threat-warns-consilium\/","title":{"rendered":"Shadow AI emerging as a major cyber threat, warns Consilium"},"content":{"rendered":"
Shadow AI is emerging as a significant threat to businesses, responsible for 20% of data breaches and adding an average of $670,000 to breach costs for organisations with high levels of shadow AI, according to Consilium in the 2025 IBM Cost of a Data Breach Report.<\/p>\n
Shadow AI refers to the use of AI tools or models within an organisation without formal approval, oversight, or security controls\u2014creating hidden vulnerabilities and compliance risks.<\/p>\n
Customer Personally Identifiable Information (PII) was the most frequently compromised data type (65%), often used for financial, insurance, and identity fraud, or sold on the dark web. Intellectual property was compromised less often (40%) but was the most expensive, costing $178 per record.<\/p>\n
Consilium warns brokers of the urgent need to build AI governance into clients\u2019 cyber risk frameworks before regulators, attackers, or insurers force the issue.<\/p>\n
Ethan Godlieb, Consilium\u2019s Associate Partner leading Cyber, Tech and Fintech within its Professional & Executive Risks Division, said, \u201cMost organisations have adopted AI tools now to some degree in the workplace, but few are governing it, as this latest report from IBM confirms.<\/p>\n
\u201cThe question now isn\u2019t whether clients use AI, but how they use it. Simply relying on existing broad cyber wordings might not be enough with increasing scrutiny on AI governance. Brokers need to urge clients to audit AI usage and implement governance policies to reduce exposure, and they should consider ensuring affirmative AI coverage is included within their clients\u2019 cyber policy wordings. Governance gaps are widening, and shadow AI is the new insider threat.\u201d<\/p>\n The IBM report spans 600 organisations affected by data breaches between March 2024 and February 2025, across 17 industries and 16 countries. It includes interviews with over 3000 c-suite business leaders.<\/p>\n It found that 63% of breached organisations had no AI governance policy, and only 34% audited for unsanctioned AI use.<\/p>\n The report also highlights an escalating AI arms race, with AI used both as a weapon and a shield in cyber warfare. While the average cost of a breach has dropped for the first time in five years\u2014to $4.44 million\u2014thanks to AI-powered defences and breach containment, one in six breaches now involve AI-driven attacks such as phishing and deepfakes.<\/p>\n The post Shadow AI emerging as a major cyber threat, warns Consilium<\/a> appeared first on ReinsuranceNe.ws<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":" Shadow AI is emerging as a significant threat to businesses, responsible for 20% of data breaches and adding an average […]<\/p>\n","protected":false},"author":1,"featured_media":1745,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[14],"tags":[],"_links":{"self":[{"href":"http:\/\/www.xinetica.com\/index.php\/wp-json\/wp\/v2\/posts\/1743"}],"collection":[{"href":"http:\/\/www.xinetica.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.xinetica.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.xinetica.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.xinetica.com\/index.php\/wp-json\/wp\/v2\/comments?post=1743"}],"version-history":[{"count":3,"href":"http:\/\/www.xinetica.com\/index.php\/wp-json\/wp\/v2\/posts\/1743\/revisions"}],"predecessor-version":[{"id":1747,"href":"http:\/\/www.xinetica.com\/index.php\/wp-json\/wp\/v2\/posts\/1743\/revisions\/1747"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.xinetica.com\/index.php\/wp-json\/wp\/v2\/media\/1745"}],"wp:attachment":[{"href":"http:\/\/www.xinetica.com\/index.php\/wp-json\/wp\/v2\/media?parent=1743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.xinetica.com\/index.php\/wp-json\/wp\/v2\/categories?post=1743"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.xinetica.com\/index.php\/wp-json\/wp\/v2\/tags?post=1743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<\/a><!–
<\/a>–><\/p>\n<\/div>\n<\/div>\n