{"id":67216,"date":"2025-05-15T08:27:50","date_gmt":"2025-05-15T15:27:50","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=67216"},"modified":"2025-06-16T13:06:22","modified_gmt":"2025-06-16T03:06:22","slug":"4th-state-of-it-security","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/","title":{"rendered":"Inside the State of IT, Fourth Edition: Security Report"},"content":{"rendered":"\n<p>The world of IT security is in constant motion, but the rapid advancements in <a href=\"https:\/\/www.salesforce.com\/au\/artificial-intelligence\/what-is-ai\/\">artificial intelligence (AI)<\/a> are creating a seismic shift. Cybercriminals are using AI to craft more sophisticated attacks, presenting new challenges for organisations. However, AI also helps detect and respond to threats more efficiently, automating routine tasks and freeing employees for more valuable work.<\/p>\n\n\n\n<p>In the fourth edition of our new <a href=\"https:\/\/www.salesforce.com\/au\/form\/platform\/4th-state-of-it-security\/?d=701ed00000W8rvxAAB&amp;nc=701ed00000W8Lw7AAF\">State of IT: Security report,<\/a> which surveyed more than 4,000 IT leaders worldwide (including more than 2,000 security and compliance specialists), we explore this new dynamic, offering critical insights for organisations looking to <a href=\"https:\/\/www.salesforce.com\/blog\/ai-digital-transformation\/\" target=\"_blank\" rel=\" noopener\">innovate while staying secure<\/a>.<\/p>\n\n\n\n<p>Our findings reveal that striking this balance isn&#8217;t always easy, but it&#8217;s possible with the right tools and by embedding security into every step of the development process. Read on for some of the key trends from the report.<\/p>\n\n\n\n<div class=\"layout-five wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">Future-proof your IT security strategy<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Learn how the top security and compliance professionals are securing their data in the AI era.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_self\" href=\"https:\/\/www.salesforce.com\/au\/form\/platform\/4th-state-of-it-security\/?d=701ed00000W8rvxAAB&#038;nc=701ed00000W8Lw7AAF\">Download the report<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-five.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-five.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-five.png\" alt=\"\">\n\t\t\n\t<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-trend-1-security-budgets-are-on-the-rise-again\">Trend 1: Security budgets are on the rise (again)<\/h2>\n\n\n\n<p>Over the past five years, IT security budgets as a percentage of overall IT spending have steadily increased, <a href=\"https:\/\/www.iansresearch.com\/resources\/press-releases\/detail\/new-research-reveals-security-budgets-only-increased-2-points-in-2024--while-12--of-cisos-faced-reductions\" target=\"_blank\" rel=\" noopener\">rising from 8.6% in 2020 to 13.2% in 2024<\/a>. Based on the findings in our report, that trend should continue. Seventy-five percent of organisations anticipate an increase in their security budgets to help fend off more frequent and sophisticated cyber threats.\u00a0<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69d6e4efd10fd&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69d6e4efd10fd\" class=\"wp-block-image size-full is-resized wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.salesforce.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/05\/IT-Security-Report2.png?strip=all&#038;quality=95\" alt=\"Chart showing anticipated security budget changes for the next year.\" class=\"wp-image-112804\" style=\"width:527px;height:auto\"\/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><figcaption class=\"wp-element-caption\">State of IT, Fourth Edition: Security Report<\/figcaption><\/figure>\n\n\n\n<p>This financial commitment underscores a growing recognition of the potential for financial and reputational damage from AI attacks like data poisoning, model inversion, privacy leakage, and others Budget increases can help organisations invest in advanced security technologies, attract and retain cybersecurity professionals, and implement comprehensive security strategies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-trend-2-trust-matters-more-in-the-ai-era\">Trend 2: Trust matters more in the AI era<\/h2>\n\n\n\n<p>AI has magnified the importance of customer trust. The report reveals that 64% of customers believe that companies handle their data irresponsibly, and 61% see AI as heightening the need for data protection. These statistics highlight the need for organisations to prioritise data stewardship.\u00a0<\/p>\n\n\n\n<p>It&#8217;s not just about meeting compliance requirements \u2014 it&#8217;s a fundamental business imperative. Organisations can build and maintain customer confidence by demonstrating a commitment to data security, ensuring transparency in data usage, and implementing stringent security protocols.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-trend-3-compliance-is-getting-more-complex\">Trend 3: Compliance is getting more complex<\/h2>\n\n\n\n<p>It&#8217;s clear from the report that the complexity of the <a href=\"https:\/\/www.salesforce.com\/au\/form\/platform\/regulations-whitepaper\/\" target=\"_blank\" rel=\" noopener\">regulatory landscape<\/a> is placing a strain on security leaders. 68% of security leaders report a tangible increase in the difficulty of maintaining compliance, driven by the rapid and often fragmented rollout of new regulations across different regions and industries.&nbsp;<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69d6e4efd232e&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69d6e4efd232e\" class=\"wp-block-image size-full is-resized wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.salesforce.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/05\/IT-Security-Report4.png?strip=all&#038;quality=95\" alt=\"Two charts showing security leader concerns about regulations.\" class=\"wp-image-112805\" style=\"width:543px;height:auto\"\/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><figcaption class=\"wp-element-caption\">State of IT, Fourth Edition: Security Report<\/figcaption><\/figure>\n\n\n\n<p>Adding another layer of complexity is the looming uncertainty surrounding new <a href=\"https:\/\/www.salesforce.com\/blog\/guide-to-eu-ai-act\/\" target=\"_blank\" rel=\" noopener\">AI-specific regulations<\/a>. Forty-three percent of security leaders admit to feeling underprepared for the potential wave of rules and guidelines that may govern the development and deployment of AI technologies. The need for more explicit guidance and proactive strategies to address AI-related compliance is becoming increasingly important.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-trend-4-ai-is-a-double-edged-sword\">Trend 4: AI is a double-edged sword<\/h2>\n\n\n\n<p>AI provides both advantages and disadvantages when it comes to IT security. While 80% of security leaders recognise <a href=\"https:\/\/www.salesforce.com\/blog\/secure-ai\/\" target=\"_blank\" rel=\" noopener\">the transformative potential of AI in enhancing their security posture<\/a> through automated threat detection, faster incident response, and advanced vulnerability analysis, they also acknowledge the new security and compliance challenges it introduces.<\/p>\n\n\n\n<p>These include the risk of AI systems being exploited by malicious actors, the complexities of securing AI algorithms and training data, and the need to adapt existing compliance frameworks to address the unique aspects of AI deployments.&nbsp;<\/p>\n\n\n\n<p>Navigating this dual nature of AI requires establishing governance frameworks, proactive risk management strategies, and a continuous learning approach to stay ahead of potential AI-driven threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-uncover-more-insights-from-the-state-of-it-security-report\">Uncover more insights from the State of IT: Security Report<\/h2>\n\n\n\n<p>These are just a few of the insights you&#8217;ll find in the <a href=\"https:\/\/www.salesforce.com\/au\/form\/platform\/4th-state-of-it-security\/?d=701ed00000W8rvxAAB&amp;nc=701ed00000W8Lw7AAF\">State of IT: Security report<\/a>. Whether you&#8217;re a security leader navigating AI governance, addressing increasing compliance demands, or aiming to build greater customer trust, this report offers valuable perspectives from your peers across industries and geographies.&nbsp;<\/p>\n\n\n\n<p>Ready to dive deeper into these findings and explore IT security in the age of AI? <a href=\"https:\/\/www.salesforce.com\/au\/form\/platform\/4th-state-of-it-security\/?d=701ed00000W8rvxAAB&amp;nc=701ed00000W8Lw7AAF\">Download the report<\/a> today to navigate the evolving security landscape and turn potential vulnerabilities into competitive advantages.<\/p>\n\n\n\n<div class=\"layout-one wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">The AI Blueprint: Lessons from ANZ business Trailblazers<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">AI is transforming industries faster than ever, delivering more than just efficiencies by driving growth, enhancing customer experiences, and empowering teams. This playbook shares insights from 280+ ANZ executives and seven trailblazing leaders.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_self\" href=\"https:\/\/www.salesforce.com\/au\/form\/agentforce\/the-ai-blueprint\/?d=701ed00000N0o62AAB&#038;nc=701ed00000MzaJgAAJ\">Download now<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\t\t<div class=\"wp-block-offer__graphics wp-block-offer__contour\"><\/div>\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-one.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-one.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-one.png\" alt=\"\">\n\t\t\n\t<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gain insights from 4,000+ IT leaders on security in our latest State of IT report, featuring four key trends and strategies driving progress.<\/p>\n","protected":false},"author":675,"featured_media":67220,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"684b7b0caedbf6d8f32b0fd9","post_meta_title":"","ai_synopsis":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[2504,2625,2858,3162],"sf_content_type":[],"coauthors":[3308],"class_list":["post-67216","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_topic-it","sf_topic-platform","sf_topic-artificial-intelligence","sf_topic-data-security-standards"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Inside the State of IT, Fourth Edition: Security Report<\/title>\n<meta name=\"description\" content=\"Learn how AI enhances IT security while simultaneously introducing new challenges, and how organizations are adapting to stay ahead.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inside the State of IT, Fourth Edition: Security Report\" \/>\n<meta property=\"og:description\" content=\"Gain insights from 4,000+ IT leaders on security in our latest State of IT report, featuring four key trends and strategies driving progress.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-15T15:27:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-16T03:06:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/State-of-it_-Security-1.png?w=3000\" \/>\n\t<meta property=\"og:image:width\" content=\"3000\" \/>\n\t<meta property=\"og:image:height\" content=\"1688\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mike Melone\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@salesforce\" \/>\n<meta name=\"twitter:site\" content=\"@salesforce\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mike Melone\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/23e463950ff01f348dc047c1cce11ebd\"}],\"headline\":\"Inside the State of IT, Fourth Edition: Security Report\",\"datePublished\":\"2025-05-15T15:27:50+00:00\",\"dateModified\":\"2025-06-16T03:06:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/\"},\"wordCount\":687,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/State-of-it_-Security-1.png\",\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/\",\"name\":\"Inside the State of IT, Fourth Edition: Security Report\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/State-of-it_-Security-1.png\",\"datePublished\":\"2025-05-15T15:27:50+00:00\",\"dateModified\":\"2025-06-16T03:06:22+00:00\",\"description\":\"Learn how AI enhances IT security while simultaneously introducing new challenges, and how organizations are adapting to stay ahead.\",\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/State-of-it_-Security-1.png\",\"contentUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/State-of-it_-Security-1.png\",\"width\":3000,\"height\":1688,\"caption\":\"80% of security leaders recognize the transformative potential of AI in enhancing their security posture. [Image: Salesforce]\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/\",\"name\":\"Salesforce\",\"description\":\"Learn how to get ahead of trends and supercharge professional relationships\",\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/au\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\",\"name\":\"Salesforce\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Salesforce\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/salesforce\",\"https:\/\/x.com\/salesforce\",\"https:\/\/instagram.com\/salesforce\",\"http:\/\/www.linkedin.com\/company\/salesforce\",\"http:\/\/www.youtube.com\/Salesforce\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/23e463950ff01f348dc047c1cce11ebd\",\"name\":\"Mike Melone\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/0e0c15318ab0575ca196573642b78890\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/mike_melone.jpeg?w=128&h=96&crop=1\",\"contentUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/mike_melone.jpeg?w=128&h=96&crop=1\",\"width\":128,\"height\":96,\"caption\":\"Mike Melone\"},\"description\":\"Mike Melone is a Content Marketing Manager for the Salesforce Platform.\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/author\/mike-melone\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Inside the State of IT, Fourth Edition: Security Report","description":"Learn how AI enhances IT security while simultaneously introducing new challenges, and how organizations are adapting to stay ahead.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/","og_type":"article","og_title":"Inside the State of IT, Fourth Edition: Security Report","og_description":"Gain insights from 4,000+ IT leaders on security in our latest State of IT report, featuring four key trends and strategies driving progress.","og_url":"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/","og_site_name":"Salesforce","article_publisher":"https:\/\/www.facebook.com\/salesforce","article_published_time":"2025-05-15T15:27:50+00:00","article_modified_time":"2025-06-16T03:06:22+00:00","og_image":[{"url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/State-of-it_-Security-1.png?w=3000","width":3000,"height":1688,"type":"image\/png"}],"author":"Mike Melone","twitter_card":"summary_large_image","twitter_creator":"@salesforce","twitter_site":"@salesforce","twitter_misc":{"Written by":"Mike Melone","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/23e463950ff01f348dc047c1cce11ebd"}],"headline":"Inside the State of IT, Fourth Edition: Security Report","datePublished":"2025-05-15T15:27:50+00:00","dateModified":"2025-06-16T03:06:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/"},"wordCount":687,"commentCount":0,"publisher":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/State-of-it_-Security-1.png","inLanguage":"en-AU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/","url":"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/","name":"Inside the State of IT, Fourth Edition: Security Report","isPartOf":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/State-of-it_-Security-1.png","datePublished":"2025-05-15T15:27:50+00:00","dateModified":"2025-06-16T03:06:22+00:00","description":"Learn how AI enhances IT security while simultaneously introducing new challenges, and how organizations are adapting to stay ahead.","inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/4th-state-of-it-security\/#primaryimage","url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/State-of-it_-Security-1.png","contentUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/State-of-it_-Security-1.png","width":3000,"height":1688,"caption":"80% of security leaders recognize the transformative potential of AI in enhancing their security posture. [Image: Salesforce]"},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/au\/blog\/#website","url":"https:\/\/www.salesforce.com\/au\/blog\/","name":"Salesforce","description":"Learn how to get ahead of trends and supercharge professional relationships","publisher":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/au\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization","name":"Salesforce","url":"https:\/\/www.salesforce.com\/au\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Salesforce"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/salesforce","https:\/\/x.com\/salesforce","https:\/\/instagram.com\/salesforce","http:\/\/www.linkedin.com\/company\/salesforce","http:\/\/www.youtube.com\/Salesforce"]},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/23e463950ff01f348dc047c1cce11ebd","name":"Mike Melone","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/0e0c15318ab0575ca196573642b78890","url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/mike_melone.jpeg?w=128&h=96&crop=1","contentUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/mike_melone.jpeg?w=128&h=96&crop=1","width":128,"height":96,"caption":"Mike Melone"},"description":"Mike Melone is a Content Marketing Manager for the Salesforce Platform.","url":"https:\/\/www.salesforce.com\/au\/blog\/author\/mike-melone\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/State-of-it_-Security-1.png","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/au\/blog","push-errors":false,"primary_topic":{"term_id":2504,"name":"IT","slug":"it","term_group":0,"term_taxonomy_id":2504,"taxonomy":"sf_topic","description":"","parent":0,"count":72,"filter":"raw"},"featured_image_url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2025\/05\/State-of-it_-Security-1.png?w=3000","_links":{"self":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/67216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/comments?post=67216"}],"version-history":[{"count":6,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/67216\/revisions"}],"predecessor-version":[{"id":67449,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/67216\/revisions\/67449"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/media\/67220"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/media?parent=67216"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/sf_topic?post=67216"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/sf_content_type?post=67216"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/coauthors?post=67216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}