DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Kiteworks’ New Survey Reveals Critical Need to Shift From Legacy Web Forms

DigitalCIO Bureau by DigitalCIO Bureau
December 8, 2025
in Tech News
0
Kiteworks’ New Survey Reveals Critical Need to Shift From Legacy Web Forms
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter
Kiteworks has released its comprehensive 2025 Data Security and Compliance Risk: Data Forms Survey Report. The research of 324 cybersecurity, risk, IT, and compliance professionals exposes a stark reality: Organizations face a critical security gap between their confidence in web form protection and actual incident rates, with sovereignty and encryption requirements driving an urgent shift from legacy web forms to secure data forms. The survey findings paint a sobering picture of web form vulnerability in modern enterprises. Despite 64% of organizations rating their security maturity as advanced or leading, an overwhelming 88% experienced at least one web form security incident in the past two years, with 44% suffering confirmed data breaches through form submissions. “The findings are clear. Stop using legacy web forms. Start using secure data forms,” said Tim Freestone, CMO at Kiteworks. “This research reveals a fundamental truth that security leaders have suspected but couldn’t quantify. Traditional web forms have become the weakest link in enterprise data protection. Organizations collect their most sensitive information through forms—financial records, health data, authentication credentials, government IDs—yet most form solutions were built for convenience, not security. The industry needs to evolve from treating forms as simple data entry tools to recognizing them as critical infrastructure requiring military-grade protection, complete data sovereignty, and continuous compliance validation.” Attack Landscape Reveals Persistent Threats The report documents widespread and sophisticated attacks targeting web forms across all industries:
  • 61% faced bot and automated attacks flooding forms with malicious traffic
  • 47% experienced SQL injection attacks despite widespread adoption of parameterized queries
  • 39% encountered cross-site scripting (XSS) vulnerabilities
  • 28% suffered session hijacking incidents
  • 21% experienced man-in-the-middle attacks
These attacks persist despite high adoption of traditional security controls. The data suggests that controls exist at the platform level but fail to achieve consistent coverage across legacy, embedded, and department-owned forms. Data Sovereignty Emerges as Non-Negotiable Requirement The survey’s most striking finding: 85% of organizations rate data sovereignty as critical or very important, with 61% stating it is strictly required for compliance. Sovereignty requirements remain consistently high across industries—government (94%), financial services (93%), healthcare (83%), and technology (86%). “The sovereignty findings fundamentally change the conversation around form security,” said Patrick Spencer, SVP of Americas Marketing and Industry Research at Kiteworks. “Organizations cannot simply opt out of sovereign control—they must demonstrate that citizen and customer data remains within approved jurisdictions. Traditional form solutions cannot deliver these capabilities because they were never architected with multi-region isolation or government-cloud deployment in mind. The market is dividing between vendors who can prove data residency and those who cannot.” Regulatory Complexity Drives Market Segmentation Organizations operate under multiple overlapping frameworks: 92% face GDPR requirements, 58% must satisfy PCI DSS, 41% operate under HIPAA (97% in healthcare), and 75% of government respondents require FedRAMP authorization. This regulatory convergence creates distinct market segments with sharply different security needs. The high-security segment—government and financial services—demands FedRAMP authorization, FIPS 140-3 validated cryptography, and strict data residency controls. Government agencies require that 75% of data remains within national borders, effectively excluding vendors without government-grade certifications. Financial services faces the highest risk profile (90% collect financial records, 83% process payment cards), while healthcare handles the most sensitive data (97% collect protected health information). The research shows 71% plan upgrades within six months, driven by recent incidents (82%) and regulatory requirements (76%). Detection-Response Gap Leaves Organizations Vulnerable The research uncovers a critical operational gap: While 82% of organizations have real-time threat detection capabilities, only 48% have automated incident response in place. This means approximately 34% can detect attacks in real time but still depend on manual processes—tickets, emails, and human handoffs—to contain them. Organizations that combine real-time detection with automated response report notably lower breach rates and faster containment times. The data suggests that detection without orchestration creates dangerous delays, increasing the probability that reconnaissance attacks escalate into full data breaches. Mobile Security Lags Despite Dominant Usage Mobile devices now represent the primary channel for form submissions, with 71% of organizations receiving 21% to 60% of submissions from mobile devices. However, mobile-specific security controls lag significantly behind desktop protections. Only 23% rate certificate pinning as critical, and biometric authentication—adopted by 48%—is rarely enforced on high-risk flows. This gap creates substantial risk as attackers increasingly target mobile-heavy forms such as customer identity verification, password reset workflows, benefits enrollment, and service portals where sensitive data combines with weaker client-side defenses. Key Recommendations for Enterprise Security Leaders The report provides strategic recommendations for reducing form-related risk, including:
  • Centralize governance across all forms to enforce uniform security standards
  • Enforce end-to-end encryption with FIPS 140-3 validation and field-level encryption
  • Implement data sovereignty controls with flexible deployment options
  • Pair real-time monitoring with automated incident response
  • Automate compliance evidence generation
Tags: Kiteworks
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

AI to Drive Smarter Business Growth Through 2030: IBM

by DigitalCIO Bureau
January 23, 2026
0
IBM Makes Llama 2 Available Within Its Watsonx AI And Data Platform

New research from the IBM Institute for Business Value reveals that nearly eight in ten (79%) surveyed executives expect AI will significantly contribute to their revenue by 2030...

Read moreDetails

Rubrik Launches Security Cloud Sovereign

by DigitalCIO Bureau
January 22, 2026
0
Rubrik Acquires Cloud Security Startup Laminar

Cybersecurity specialist Rubrik has announced the launch of Rubrik Security Cloud Sovereign. With this new solution, the company addresses the growing need of governments and multinational corporations to...

Read moreDetails

Digital Fraud Overtakes Ransomware as CEOs’ Biggest Concern

by DigitalCIO Bureau
January 19, 2026
0
Retail Industry — Next Big Target for Hackers?

Artificial intelligence, geopolitical fragmentation and a surge in cyber-enabled fraud are redefining the global cyber risk landscape at unprecedented speed, according to the World Economic Forum’s Global Cybersecurity Outlook...

Read moreDetails

Cyera Secures $400M Series F, Hits $9B Valuation

by DigitalCIO Bureau
January 13, 2026
0
Cyera Secures $400M Series F, Hits $9B Valuation

Cyera has announced a $400 million Series F funding round, bringing its total funding to over $1.7 billion. This raise comes just six months after the previous round...

Read moreDetails

Trend Micro Closes Vulnerabilities in Apex Central

by DigitalCIO Bureau
January 9, 2026
0
Financial organizations receive an average of 2200+ application security vulnerability alerts every month: Dynatrace CISO Regional Bank 2023 report

The National Cyber ​​Security Centre (NCSC) is warning of vulnerabilities in Trend Micro Apex Central. These vulnerabilities could potentially cause a Denial-of-Service (DoS) attack. Updates addressing the vulnerability...

Read moreDetails
Next Post
Vertiv extends Liebert ITA2 UPS Range, providing flexible Edge and Smart IT power backup in India

Vertiv completes acquisition of Purge Rite Intermediate

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Dell leads HPE in expanding enterprise storage market

December 19, 2018

Can Quantum Computing Help Fight the COVID-19 Pandemic

August 20, 2023
Fortinet Expands Universal SASE Coverage with Two New India-Based Data Centres   

AI Skillsets Critical to Cybersecurity Skills Gap Solution

October 14, 2025

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft New Relic NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?