Skip to Content

Immuta security report identifies 2024 priorities

Immuta security report identifies 2024 priorities

BOSTON – Data security provider Immuta has issued the findings of its fourth annual State of Data Security Report, which highlights the current state of data security amid organizations’ rapid adoption of artificial intelligence (AI) and generative AI tools.

The 2024 State of Data Security Report was commissioned by Immuta and conducted by customer voice platform UserEvidence, which surveyed 700 data platform and security practitioners at global cloud-based enterprise companies across the U.S., UK, Canada, and Australia. 

According to Immuta the findings from the report indicate that adoption and use of AI tools is high across organizations, however many are concerned about the impacts AI will have on their larger data security strategy. Only half of the respondents say their organization’s data security strategy is keeping up with AI’s rate of evolution, and despite AI’s recent boom, implementing stronger data governance and security controls will be a higher priority for data teams in 2024.

When asked what significant initiatives their company is taking on in the next 12 months, 80% of respondents said their top priorities were data security related initiatives – such as implementing stronger data governance and security controls, and modernizing data architectures with new concepts like data mesh – while only 20% noted integrating AI into business processes will be a top priority.

“With the rapid onset of AI solutions and ongoing push to migrate data to the cloud, data leaders are now grappling with how to prioritize data security, agility, and visibility. They need solutions that provide both proper data protection and the flexibility to use data to drive value,” said Matt Carroll, CEO of Immuta. “Without the foundation of a strong data architecture and data security strategy in place, it will be impossible for organizations to safely integrate AI into their processes. Business leaders must design AI-specific security strategies that include the right protocols and policies to protect data.”

The full report can be found online at



To comment on this post, please log in to your account or set up an account now.