DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Kiteworks’ New Survey Reveals Critical Need to Shift From Legacy Web Forms

DigitalCIO Bureau by DigitalCIO Bureau
December 8, 2025
in Tech News
0
Kiteworks’ New Survey Reveals Critical Need to Shift From Legacy Web Forms
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter
Kiteworks has released its comprehensive 2025 Data Security and Compliance Risk: Data Forms Survey Report. The research of 324 cybersecurity, risk, IT, and compliance professionals exposes a stark reality: Organizations face a critical security gap between their confidence in web form protection and actual incident rates, with sovereignty and encryption requirements driving an urgent shift from legacy web forms to secure data forms. The survey findings paint a sobering picture of web form vulnerability in modern enterprises. Despite 64% of organizations rating their security maturity as advanced or leading, an overwhelming 88% experienced at least one web form security incident in the past two years, with 44% suffering confirmed data breaches through form submissions. “The findings are clear. Stop using legacy web forms. Start using secure data forms,” said Tim Freestone, CMO at Kiteworks. “This research reveals a fundamental truth that security leaders have suspected but couldn’t quantify. Traditional web forms have become the weakest link in enterprise data protection. Organizations collect their most sensitive information through forms—financial records, health data, authentication credentials, government IDs—yet most form solutions were built for convenience, not security. The industry needs to evolve from treating forms as simple data entry tools to recognizing them as critical infrastructure requiring military-grade protection, complete data sovereignty, and continuous compliance validation.” Attack Landscape Reveals Persistent Threats The report documents widespread and sophisticated attacks targeting web forms across all industries:
  • 61% faced bot and automated attacks flooding forms with malicious traffic
  • 47% experienced SQL injection attacks despite widespread adoption of parameterized queries
  • 39% encountered cross-site scripting (XSS) vulnerabilities
  • 28% suffered session hijacking incidents
  • 21% experienced man-in-the-middle attacks
These attacks persist despite high adoption of traditional security controls. The data suggests that controls exist at the platform level but fail to achieve consistent coverage across legacy, embedded, and department-owned forms. Data Sovereignty Emerges as Non-Negotiable Requirement The survey’s most striking finding: 85% of organizations rate data sovereignty as critical or very important, with 61% stating it is strictly required for compliance. Sovereignty requirements remain consistently high across industries—government (94%), financial services (93%), healthcare (83%), and technology (86%). “The sovereignty findings fundamentally change the conversation around form security,” said Patrick Spencer, SVP of Americas Marketing and Industry Research at Kiteworks. “Organizations cannot simply opt out of sovereign control—they must demonstrate that citizen and customer data remains within approved jurisdictions. Traditional form solutions cannot deliver these capabilities because they were never architected with multi-region isolation or government-cloud deployment in mind. The market is dividing between vendors who can prove data residency and those who cannot.” Regulatory Complexity Drives Market Segmentation Organizations operate under multiple overlapping frameworks: 92% face GDPR requirements, 58% must satisfy PCI DSS, 41% operate under HIPAA (97% in healthcare), and 75% of government respondents require FedRAMP authorization. This regulatory convergence creates distinct market segments with sharply different security needs. The high-security segment—government and financial services—demands FedRAMP authorization, FIPS 140-3 validated cryptography, and strict data residency controls. Government agencies require that 75% of data remains within national borders, effectively excluding vendors without government-grade certifications. Financial services faces the highest risk profile (90% collect financial records, 83% process payment cards), while healthcare handles the most sensitive data (97% collect protected health information). The research shows 71% plan upgrades within six months, driven by recent incidents (82%) and regulatory requirements (76%). Detection-Response Gap Leaves Organizations Vulnerable The research uncovers a critical operational gap: While 82% of organizations have real-time threat detection capabilities, only 48% have automated incident response in place. This means approximately 34% can detect attacks in real time but still depend on manual processes—tickets, emails, and human handoffs—to contain them. Organizations that combine real-time detection with automated response report notably lower breach rates and faster containment times. The data suggests that detection without orchestration creates dangerous delays, increasing the probability that reconnaissance attacks escalate into full data breaches. Mobile Security Lags Despite Dominant Usage Mobile devices now represent the primary channel for form submissions, with 71% of organizations receiving 21% to 60% of submissions from mobile devices. However, mobile-specific security controls lag significantly behind desktop protections. Only 23% rate certificate pinning as critical, and biometric authentication—adopted by 48%—is rarely enforced on high-risk flows. This gap creates substantial risk as attackers increasingly target mobile-heavy forms such as customer identity verification, password reset workflows, benefits enrollment, and service portals where sensitive data combines with weaker client-side defenses. Key Recommendations for Enterprise Security Leaders The report provides strategic recommendations for reducing form-related risk, including:
  • Centralize governance across all forms to enforce uniform security standards
  • Enforce end-to-end encryption with FIPS 140-3 validation and field-level encryption
  • Implement data sovereignty controls with flexible deployment options
  • Pair real-time monitoring with automated incident response
  • Automate compliance evidence generation
Tags: Kiteworks
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Red Hat AI now runs on AWS Trainium and Inferentia chips

by DigitalCIO Bureau
December 5, 2025
0
Red Hat AI now runs on AWS Trainium and Inferentia chips

Red Hat has announced an expanded collaboration with Amazon Web Services (AWS) to power enterprise-grade generative AI (gen AI) on AWS with Red Hat AI and AWS AI...

Read moreDetails

Kellton Acquires ServiceNow services provider Kumori Technologies

by DigitalCIO Bureau
December 5, 2025
0
CRISIL To Acquire Bridge To India Energy

Kellton has announced the acquisition of Kumori Technologies, a specialized ServiceNow services provider. The acquisition strengthens Kellton’s global ServiceNow delivery capabilities and advances its vision of building integrated,...

Read moreDetails

Hexaware Launches New Delivery Center in Cairo

by DigitalCIO Bureau
December 4, 2025
0
Hexaware Launches New Delivery Center in Cairo

Hexaware Technologies has strengthened its global delivery network with a new center in Cairo. Launching with 100 professionals, it will serve customers in Egypt, the Middle East, and...

Read moreDetails

Tata Technologies appoints Anand Sinha as Chief Digital and Information Officer

by DigitalCIO Bureau
December 3, 2025
0
Tata Technologies appoints Anand Sinha as Chief Digital and Information Officer

Anand Kumar Sinha has joined Tata Technologies as Chief Digital and Information Officer (CIDO). With an extensive experience in technology, focusing on IT operations, Technology Infrastructure, cybersecurity, ERP, AI,...

Read moreDetails

Cybercrime Will Become Increasingly Automated in 2026

by DigitalCIO Bureau
December 2, 2025
0
Trend Micro Named a Leader in Attack Surface Management in New Report

Trend Micro has released its annual Security Predictions Report for 2026, warning that the coming year will mark the true industrialization of cybercrime. Artificial intelligence (AI) and automation are now...

Read moreDetails

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Dell Technologies Expands AI Offerings to Accelerate Secure Generative AI Initiatives

Dell Technologies Expands AI Offerings to Accelerate Secure Generative AI Initiatives

October 16, 2023
Hamas Attacks on Israel – Underlining Advanced Hacking Mechanisms?

Hamas Attacks on Israel – Underlining Advanced Hacking Mechanisms?

October 11, 2023

Spirent and China Mobile Collaborate to Create 5G Over-the-Air Device Evaluation System

December 18, 2019

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope New Relic NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?