100+ datasets found
  1. Global biggest cybersecurity threats in the following year per CISOs 2024

    • statista.com
    • ai-chatbox.pro
    Updated Jun 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global biggest cybersecurity threats in the following year per CISOs 2024 [Dataset]. https://www.statista.com/statistics/1350460/cybersecurity-threats-at-companies-worldwide-cisos/
    Explore at:
    Dataset updated
    Jun 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Jan 20, 2024 - Feb 2, 2024
    Area covered
    Worldwide
    Description

    According to a 2024 survey of Chief Information Security Officers (CISO) worldwide, Ransomware attacks were a leading cybersecurity risk, with roughly ** percent naming it as one of the three major cybersecurity threats. A further share of ** percent of the respondents found malware to be a significant risk to their organizations' cybersecurity. Email fraud compromise and DDoS attacks followed closely, with ** percent.

  2. Main consequences of cyber attacks worldwide 2024

    • statista.com
    Updated Jun 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Main consequences of cyber attacks worldwide 2024 [Dataset]. https://www.statista.com/statistics/1327148/main-consequences-cyber-attacks-cybersecurity-worldwide/
    Explore at:
    Dataset updated
    Jun 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Aug 12, 2024 - Sep 2, 2024
    Area covered
    Worldwide
    Description

    Cyber attacks on businesses are becoming more frequent, targeted, and complex. The effects of a cyber attack go well beyond the direct financial consequences. In 2024, ** percent of respondents indicated greater difficulty in attracting new customers as the main consequence of cyber attacks.

  3. Global cyber incidents 2024, by type

    • statista.com
    Updated May 30, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global cyber incidents 2024, by type [Dataset]. https://www.statista.com/statistics/1483769/global-cyber-incidents-by-type/
    Explore at:
    Dataset updated
    May 30, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Oct 2023 - Sep 2024
    Area covered
    Worldwide
    Description

    As of September 2024, almost 30 percent of cyber incidents detected in the past 12 months were hacking incidents. A further 28.7 percent were incidents of misuse, and 15.2 percent of detections revealed malware attacks.

  4. Number of data compromises and impacted individuals in U.S. 2005-2024

    • statista.com
    • ai-chatbox.pro
    Updated Jul 14, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
    Explore at:
    Dataset updated
    Jul 14, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

  5. Cyber security breaches survey: ad hoc statistical releases

    • gov.uk
    Updated Jan 23, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Department for Science, Innovation and Technology (2024). Cyber security breaches survey: ad hoc statistical releases [Dataset]. https://www.gov.uk/government/statistics/cyber-security-breaches-survey-ad-hoc-statistical-releases
    Explore at:
    Dataset updated
    Jan 23, 2024
    Dataset provided by
    GOV.UKhttp://gov.uk/
    Authors
    Department for Science, Innovation and Technology
    Description

    The annual reports of the Cyber Security Breaches Survey can be found on the Cyber Security Breaches Survey collection page.

    Geographic coverage: UK.

    If you would like any further information please contact statistics@dsit.gov.uk.

    Date publishedAd hoc detailData tables
    January 2024Cyber security practices among organisations who do/ do not adhere to Cyber Essentials
  6. Share of cyberattacks in global industries worldwide 2024

    • statista.com
    • ai-chatbox.pro
    Updated May 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Share of cyberattacks in global industries worldwide 2024 [Dataset]. https://www.statista.com/statistics/1315805/cyber-attacks-top-industries-worldwide/
    Explore at:
    Dataset updated
    May 26, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2024
    Area covered
    Worldwide
    Description

    In 2024, manufacturing saw the highest share of cyberattacks among the leading industries worldwide. During the examined year, manufacturing companies encountered more than a quarter of the total cyberattacks. Organizations in the finance and insurance followed, with around 23 percent. Professional, business, and consumer services ranked third, with 18 percent of reported cyberattacks. Manufacturing industry and cyberattacks The industry of manufacturing has been in the center of cyberattacks in a long time. The share of cyberattacks targeting organizations in this sector in 2018 was at 10 percent, while in 2024, it amounted to 26 percent. The situation is even more compliacted when we look at the cyber vulnerabilities found in this sector. In 2024, critical vulnerabilities in manufacturing companies lasted 205 days on average. IT perspective and prevention With recent technology developments, cybersecurity is crucial to an organization’s success. Realizing this, companies have been gradually increasing cybersecurity investments. Thus, in 2024, the cybersecurity budget worldwide was forecast to increase to nearly 283 billion U.S. dollars. Roughly nine in ten board directors of companies worldwide in professional services and media and entertainment industries say they expect an increase in the cybersecurity budget.

  7. S

    Chinese Cyber Attack Statistics By Industry, Market Share and Facts (2025)

    • sci-tech-today.com
    Updated May 16, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Sci-Tech Today (2025). Chinese Cyber Attack Statistics By Industry, Market Share and Facts (2025) [Dataset]. https://www.sci-tech-today.com/stats/chinese-cyber-attack-statistics-updated/
    Explore at:
    Dataset updated
    May 16, 2025
    Dataset authored and provided by
    Sci-Tech Today
    License

    https://www.sci-tech-today.com/privacy-policyhttps://www.sci-tech-today.com/privacy-policy

    Time period covered
    2022 - 2032
    Area covered
    China, Global
    Description

    Introduction

    Chinese Cyber Attack Statistics: Chinese cyber attacks have become a major global issue over the last 20 years. These attacks target governments, businesses, and important industries around the world. Many of these attacks are supported by the state, and their main goals are spying, stealing intellectual property, and gaining advantages in areas like technology, defence, and telecommunications.

    In 2024, the global digital world will continue to face threats from cyberattacks linked to China. Because of this, governments and organisations need to strengthen their cybersecurity measures to protect their assets and data from these harmful activities.

  8. z

    Global Dataset of Cyber Incidents

    • zenodo.org
    bin, csv, pdf, txt
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Kerstin Zettl-Schabath; Kerstin Zettl-Schabath; Jakob Bund; Jakob Bund; Martin Müller; Martin Müller; Camille Borrett; Jonas Hemmelskamp; Jonas Hemmelskamp; Asaf Alibegovic; Enis Bajra; Alisa Jazxhi; Erik Kellenter; Annika Sachs; Callahan Shelley; Camille Borrett; Asaf Alibegovic; Enis Bajra; Alisa Jazxhi; Erik Kellenter; Annika Sachs; Callahan Shelley (2025). Global Dataset of Cyber Incidents [Dataset]. http://doi.org/10.5281/zenodo.14965395
    Explore at:
    pdf, bin, txt, csvAvailable download formats
    Dataset updated
    Apr 1, 2025
    Dataset provided by
    European Repository of Cyber Incidents
    Authors
    Kerstin Zettl-Schabath; Kerstin Zettl-Schabath; Jakob Bund; Jakob Bund; Martin Müller; Martin Müller; Camille Borrett; Jonas Hemmelskamp; Jonas Hemmelskamp; Asaf Alibegovic; Enis Bajra; Alisa Jazxhi; Erik Kellenter; Annika Sachs; Callahan Shelley; Camille Borrett; Asaf Alibegovic; Enis Bajra; Alisa Jazxhi; Erik Kellenter; Annika Sachs; Callahan Shelley
    License

    Attribution-NonCommercial 4.0 (CC BY-NC 4.0)https://creativecommons.org/licenses/by-nc/4.0/
    License information was derived automatically

    Description

    The European Repository of Cyber Incidents (EuRepoC) is releasing the Global Dataset of Cyber Incidents in Version 1.3 as an extract of our backend database. This official release contains fully consolidated cyber incident data reviewed by our interdisciplinary experts in the fields of politics, law and technology across all 60 variables covered by the European Repository. Version 1.3 covers the years 2000 – 2024 entirely. The Global Dataset is meant for reliable, evidence-based analysis. If you require real-time data, please refer to the download option in our TableView or contact us for special requirements (including API access).

    The dataset now contains data on 3416 cyber incidents which started between 01.01.2000 and 31.12.2024. The European Repository of Cyber Incidents (EuRepoC) gathers, codes, and analyses publicly available information from over 220 sources and 600 Twitter accounts daily to report on dynamic trends in the global, and particularly the European, cyber threat environment.

    For more information on the scope and data collection methodology see: https://eurepoc.eu/methodology

    Full Codebook available here

    Information about each file

    please scroll down this page entirely to see all files available. Zenodo only displays the attribution dataset by default.

    Global Database (csv or xlsx):
    This file includes all variables coded for each incident, organised such that one row corresponds to one incident - our main unit of investigation. Where multiple codes are present for a single variable for a single incident, these are separated with semi-colons within the same cell.

    Receiver Dataset (csv or xlsx):
    In this file, the data of affected entities and individuals (receivers) is restructured to facilitate analysis. Each cell contains only a single code, with the data "unpacked" across multiple rows. Thus, a single incident can span several rows, identifiable through the unique identifier assigned to each incident (incident_id).

    Attribution Dataset (csv or xlsx):
    This file follows a similar approach to the receiver dataset. The attribution data is "unpacked" over several rows, allowing each cell to contain only one code. Here too, a single incident may occupy several rows, with the unique identifier enabling easy tracking of each incident (incident_id). In addition, some attributions may also have multiple possible codes for one variable, these are also "unpacked" over several rows, with the attribution_id enabling to track each attribution.

    Dyadic Dataset (csv or xlsx):
    The dyadic dataset puts state dyads in the focus. Each row in the dataset represents one cyber incident in a specific dyad. Because incidents may affect multiple receivers, single incidents can be duplicated in this format, when they affected multiple countries.

  9. c

    Global Cyber Security Consulting Market Report 2025 Edition, Market Size,...

    • cognitivemarketresearch.com
    pdf,excel,csv,ppt
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cognitive Market Research, Global Cyber Security Consulting Market Report 2025 Edition, Market Size, Share, CAGR, Forecast, Revenue [Dataset]. https://www.cognitivemarketresearch.com/cyber-security-consulting-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset authored and provided by
    Cognitive Market Research
    License

    https://www.cognitivemarketresearch.com/privacy-policyhttps://www.cognitivemarketresearch.com/privacy-policy

    Time period covered
    2021 - 2033
    Area covered
    Global
    Description

    Market Summary of Cyber Security Consulting Market:

    • Global Cyber Security Consulting market size 2023 was XX Million. Cyber Security Consulting Industry compound annual growth rate (CAGR) will be XX% from 2024 till 2031. • The Cyber Threats and cyberattacks are driving the cyber-Security consulting the market's rapid growth along with Increase in the need for security in BFSI Sector. • The COVID-19 had presented obstacles for enterprises as they adjust to a work environment where telecommuting has turned into the new normal. Businesses were moving more quickly towards digital transformation, and cybersecurity is becoming a top priority • The dominating segment is the IT and Telecom. Mobile phones, smart IoT devices, data traffic subscribers, and SIM connections have all increased astronomically in the world. Because of this, network operators can now offer a significantly wider range of services, which requires them to handle more data security. • North America is the dominating region in this market due to the prevalence of large and mid-sized organization’s is rising, which is increasing the number of hosted servers and the frequency of cyberattacks.

    Market Dynamics of Cyber Security Consulting Market:

    Key Drivers of Cyber Security Consulting Market

    Cyber Threats and cyberattacks are driving the cyber-Security consulting the market's rapid growth.
    

    The growing threat landscape, which includes data breaches and ransomware assaults, is a major factor in the rise of cybersecurity consulting services. The Internet is becoming more and more popular across all industries as a result of digitization and technical improvements. The likelihood of cyberattacks rises with increased Internet usage. Cyberattacks are a major global threat that result in the loss of personal, corporate, and governmental data. Businesses are always under pressure to make sure their digital assets are safe from internet attacks, and cybersecurity threats are getting more complex. Consulting on cybersecurity is essential for protecting your company from possible dangers and lowering the likelihood of cyberattacks.Hence, These consulting services give companies the knowledge and resources they need to spot security flaws, create strong defences against online attacks, and keep their systems safe. Organisations can discover potential vulnerabilities and threats to their digital assets, such as sensitive information, financial data, and intellectual property, by conducting cybersecurity risk assessments, which is a crucial procedure. For Instance, The cybersecurity company Kaspersky issued a warning, stating that similar cyberthreats are likely to come India's way. The country saw over 200,000 ransomware attacks in 2023. Large ransomware gangs like Fonix and LockBit attacked companies in India and throughout the world in industries like manufacturing, retail, healthcare, agriculture, and media. (Source:https://www.businesstoday.in/technology/news/story/new-ransomware-attacks-still-keeping-indian-cyberspace-at-risk-kaspersky-424512-2024-04-05) Cybersecurity experts detect risks to a company's computer systems and networks, analyse security concerns, determine risk, and put remedies into place. In an IT environment that is evolving quickly, they create layers of protection and deal with a variety of issues while evaluating security systems. Ransomware, phishing, and hacking are examples of cybersecurity threats that have grown in sophistication along with technology. Attacks on servers known as total distributed denial of service (DDoS) cause disruptions to user access. Thus, it is essential to identify cyber threats and use strong cyber security consulting to guard against such breaches in order to implement a system with more robust security features.

    Increase in the need for security in BFSI Sector, drives the market for Cyber Security Consulting Market.
    

    Following demonetization, digital payments have become more popular than ever before, underscoring the necessity of security policies and programmes for India's banking, financial services, and insurance (BFSI) industry. While financial institutions worldwide are concentrating on improving their programmes to prevent cyber threats, BFSI institutions continue to fail to recognise the significance and consequences of cyb...

  10. c

    Global Information Security Consulting Market Report 2025 Edition, Market...

    • cognitivemarketresearch.com
    pdf,excel,csv,ppt
    Updated Jun 13, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cognitive Market Research (2024). Global Information Security Consulting Market Report 2025 Edition, Market Size, Share, CAGR, Forecast, Revenue [Dataset]. https://www.cognitivemarketresearch.com/information-security-consulting-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset updated
    Jun 13, 2024
    Dataset authored and provided by
    Cognitive Market Research
    License

    https://www.cognitivemarketresearch.com/privacy-policyhttps://www.cognitivemarketresearch.com/privacy-policy

    Time period covered
    2021 - 2033
    Area covered
    Global
    Description

    According to Cognitive Market Research, the Global Information Security Consulting Market is expected to have a market size of XX million in 2024 with a growing CAGR of XX% during the forecast period.

    The Asia-Pacific region has the largest market share with an expected market size of XX million in 2024 with a growing CAGR of XX% during the forecast period.
    North America is the fastest growing with an expected market size of XX million in 2024 with a growing CAGR of XX% during the forecast period.
    Cloud Security has the largest market share with an expected market size of XX million in 2024 with a growing CAGR of XX% during the forecast period.
    The cloud segment has the largest market share with an expected market size of XX million in 2024 with a growing CAGR of XX% during the forecast period.
    Large Enterprise has the largest market share with an expected market size of XX million in 2024 with a growing CAGR of XX% during the forecast period.
    The BFSI segment has the largest market share with an expected market size of XX million in 2024 with a growing CAGR of XX% during the forecast period.
    

    Market Dynamics

    Key drivers

    The increasing number of cyber-attacks globally is favoring market growth
    

    Strong security solutions are in more demand as a result of the growing anxiety that cyber assaults are causing among both individuals and enterprises. Any hostile action directed towards computer networks, infrastructures, personal computers, smartphones, or computer information systems is called a cyberattack. Because of this and the need for more stringent security and regulatory compliance, the information security consulting industry is growing quickly. For instance, according to McKinsey and company, cyberattacks are on track to cause $10.5 trillion a year in damage by 2025. That’s a 300 percent increase from 2015 levels. To protect against the onslaught, organizations around the world spent around $150 billion on cybersecurity in 2021, and this sum is growing by 12.4 percent a year. In all industries combined, the average cost of a single data breach as of 2022 was approximately 4.35 million US dollars. The healthcare industry was shown to be the most expensive for this, with each leak estimated to have cost the impacted party a whopping 10.1 million dollars. The segment on finances was closely followed. The Cam4 data breach in March 2020, which revealed over 10 billion data records, was the largest known data leak as of January 2024. The Yahoo data breach, which happened in 2013, is currently the second-largest data breach in history. To compact these increasing data breaches and cybercrimes, many company solutions have been in development and adopted. Cloud migration will remain a key component of many organizations' technological agendas. For this reason, cloud providers must be able to safeguard both standard and customized cloud configurations. Furthermore, there is a sharp rise in the demand for cyber security in the fields of healthcare, banking and financial services, aviation, and automobiles. Some of the main factors driving the demand for technologically advanced information security solutions among businesses are the emergence of IoT and connected technologies, the quick adoption of smartphones for digital payments, and the use of unsecured networks for accessing organizational servers. Therefore, the market is expected to grow significantly in the coming years.

    (Source-http://https://www.statista.com/statistics/290525/cyber-crime-biggest-online-data-breachesworldwide/#:~:text=The%20largest%20reported%20data%20leakage,data%20breach%2C%20occurred%20in%202013.)

    The rise in the number of regulations and developments has favoured the market growth
    

    As cyber risks continue to grow, information security has become a key concern for both individuals and enterprises. The laws and regulatory requirements that are propelling the information security market's expansion are intended to strengthen cybersecurity defenses and shield private information from nefarious individuals. For instance, The United States government enacted two cybersecurity laws into law in June 2022. The first bill, the State and Local Government Cybersecurity Act of 2022, aims to improve cooperation between state, territorial, local, and tribal governments as well as the Cybersecurity and Infrastructure Security Agency (CISA). It is anticipated that these important actions will boost the i...

  11. Average cost per data breach in the United States 2006-2024

    • statista.com
    • ai-chatbox.pro
    Updated Jun 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Average cost per data breach in the United States 2006-2024 [Dataset]. https://www.statista.com/statistics/273575/us-average-cost-incurred-by-a-data-breach/
    Explore at:
    Dataset updated
    Jun 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    As of 2024, the average cost of a data breach in the United States amounted to **** million U.S. dollars, down from **** million U.S. dollars in the previous year. The global average cost per data breach was **** million U.S. dollars in 2024. Cost of a data breach in different countries worldwide Data breaches impose a big threat for organizations globally. The monetary damage caused by data breaches has increased in many markets in the past decade. In 2023, Canada followed the U.S. by data breach costs, with an average of **** million U.S. dollars. Since 2019, the average monetary damage caused by loss of sensitive information in Canada has increased notably. In the United Kingdom, the average cost of a data breach in 2024 amounted to around **** million U.S. dollars, while in Germany it stood at **** million U.S. dollars. The cost of data breach by industry and segment Data breach costs vary depending on the industry and segment. For the fourth consecutive year, the global healthcare sector registered the highest costs of data breach, which in 2024 amounted to about **** million U.S. dollars. Financial institutions ranked second, with an average cost of *** million U.S. dollars for a data breach. Detection and escalation was the costliest segment in data breaches worldwide, with **** U.S. dollars on average. The cost for lost business ranked second, while response following a breach came across as the third-costliest segment.

  12. Healthcare Cyber Security Market Research Report 2033

    • growthmarketreports.com
    csv, pdf, pptx
    Updated Jun 30, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Growth Market Reports (2025). Healthcare Cyber Security Market Research Report 2033 [Dataset]. https://growthmarketreports.com/report/healthcare-cyber-security-market-global-industry-analysis
    Explore at:
    csv, pptx, pdfAvailable download formats
    Dataset updated
    Jun 30, 2025
    Dataset authored and provided by
    Growth Market Reports
    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Healthcare Cyber Security Market Outlook



    According to our latest research, the global healthcare cyber security market size in 2024 is valued at USD 17.2 billion, driven by the increasing digitization of healthcare systems and the rising frequency of cyber-attacks targeting sensitive medical data. The market is projected to grow at a CAGR of 16.8% during the forecast period, reaching approximately USD 49.6 billion by 2033. This robust growth is primarily fueled by the proliferation of electronic health records (EHRs), expanding telemedicine adoption, and stringent regulatory mandates for data protection in the healthcare sector.




    One of the most significant growth factors for the healthcare cyber security market is the exponential rise in cyber threats and data breaches affecting healthcare organizations globally. With healthcare data being highly valuable on the black market, malicious actors are increasingly targeting hospitals, clinics, insurance companies, and pharmaceutical firms. The proliferation of connected medical devices and the Internet of Medical Things (IoMT) has further expanded the attack surface, making healthcare systems more vulnerable. As a result, organizations are investing heavily in advanced cyber security solutions and services to safeguard patient data, intellectual property, and critical infrastructure, propelling market growth.




    Another key driver is the rapid digitization and integration of information technology in healthcare operations. The adoption of electronic health records, telehealth platforms, cloud-based applications, and mobile health apps has transformed patient care delivery but has also introduced new vulnerabilities. Regulatory frameworks such as HIPAA in the United States, GDPR in Europe, and similar mandates worldwide require healthcare providers to implement robust data protection strategies. This regulatory pressure, combined with the reputational and financial risks associated with data breaches, is compelling healthcare organizations to prioritize cyber security investments, further accelerating market expansion.




    The growing complexity of healthcare networks, coupled with the need for interoperability and real-time data sharing, has created additional challenges in maintaining security. As healthcare systems integrate third-party vendors, cloud platforms, and mobile devices, the risk of unauthorized access and data leakage increases. The demand for comprehensive security solutions, including network security, endpoint security, application security, and cloud security, is surging. Moreover, the shift towards value-based care and the rise of remote patient monitoring are encouraging healthcare stakeholders to adopt proactive and holistic cyber security frameworks to ensure patient safety and operational continuity.




    From a regional perspective, North America dominates the healthcare cyber security market, accounting for the largest revenue share in 2024, followed by Europe and Asia Pacific. The United States, in particular, leads the market due to high healthcare IT adoption, stringent regulatory requirements, and a significant number of cyber incidents reported annually. Europe is witnessing robust growth, driven by GDPR compliance and increasing investments in healthcare IT infrastructure. Meanwhile, the Asia Pacific region is emerging as a high-growth market, fueled by rapid digital transformation in healthcare, rising awareness about data protection, and government initiatives to strengthen cyber security frameworks. Latin America and the Middle East & Africa are also experiencing steady growth, albeit at a slower pace, as healthcare organizations in these regions gradually enhance their cyber security capabilities.





    Component Analysis



    The healthcare cyber security market is segmented by component into solutions and services, each playing a critical role in the overall security posture of healthcare organizations. Solutions encompass a wide range of software and hardware off

  13. c

    Global Industrial Cybersecurity Market Report 2025 Edition, Market Size,...

    • cognitivemarketresearch.com
    pdf,excel,csv,ppt
    Updated Jul 15, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cognitive Market Research (2023). Global Industrial Cybersecurity Market Report 2025 Edition, Market Size, Share, CAGR, Forecast, Revenue [Dataset]. https://www.cognitivemarketresearch.com/industrial-cybersecurity-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset updated
    Jul 15, 2023
    Dataset authored and provided by
    Cognitive Market Research
    License

    https://www.cognitivemarketresearch.com/privacy-policyhttps://www.cognitivemarketresearch.com/privacy-policy

    Time period covered
    2021 - 2033
    Area covered
    Global
    Description

    According to Cognitive Market Research, the global industrial cybersecurity market size reached USD 23.5 billion in 2024 and will expand at a CAGR of 8.2% from 2024 to 2031. Market Dynamics of Industrial Cybersecurity Market

    Key Drivers for Industrial Cybersecurity Market

    Emergence of Disruptive Digital Technologies - Government agencies and other organizations are launching measures to accelerate the use of emerging technologies in manufacturing industries. For example, in 2022, the UAE's Ministry of Industry and Advanced Technology (MoIAT) and EDGE Group PJSC (UAE) signed a memorandum of understanding (MoU) to set up the first Industry 4.0 Enablement Centre to promote the robust implementation of Industry 4.0 technologies throughout the manufacturing sector in the country. Digital transformation boosts productivity, improves efficiency, and lowers manufacturing costs. However, it also gives hackers more opportunities to exploit vulnerable networks and systems. As per Trend Micro Incorporated (Japan), 61% of industrial manufacturers reported cybersecurity problems in their smart factories in 2020. These attacks affected manufacturing processes, causing output delays and permanent loss of capital and essential and confidential data. As a result, the heightened risk of cyberattacks associated with the emergence of disruptive digital technologies has increased the demand for access control, real-time security monitoring, and surveillance in manufacturing facilities, propelling the market adoption of cybersecurity solutions in the industrial sector.
    Moreover, the constant increase in the utilization of cloud-based solutions by SMEs and industrial cybersecurity-as-a-service are leading trends in this global market expansion.
    

    Key Restraints for Industrial Cybersecurity Market

    The higher implementation costs, the complexity of integration across diverse industrial environments, and a shortage of specialized cybersecurity expertise are the primary barriers to the industrial cybersecurity market's growth.
    The industry also faces substantial challenges as some firms are hesitant to adopt new technologies due to concerns about operational disruptions during deployment or potential compatibility issues with existing systems.
    

    Introduction of the Industrial Cybersecurity Market

    Industrial enterprises face more cybersecurity challenges than ever before. Ransomware and political instability heighten the risk of safety problems and operational disruptions. The industrial cybersecurity market includes technologies, solutions, and services for protecting industrial control systems (ICS), supervisory control & data acquisition (SCADA) systems, and other operational technology (OT) infrastructure against cyber-attacks and vulnerabilities. Malware, phishing attacks, ransomware, insider threats, and other malicious actions are examples of cyber threats that try to disrupt or compromise industrial processes, vital infrastructure, and manufacturing operations. The introduction of AI and IoT-powered industrial robots has raised the market demand for robust industrial cybersecurity services for defense against increased cyber-attacks and data breaches. The combination of AI and industrial robots enabled the automation of complex and repetitive activities, which is expanding industrial productivity and efficiency.

  14. Cybersecurity Threat and Awareness Program Dataset

    • kaggle.com
    Updated Oct 19, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    DatasetEngineer (2024). Cybersecurity Threat and Awareness Program Dataset [Dataset]. http://doi.org/10.34740/kaggle/dsv/9665651
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Oct 19, 2024
    Dataset provided by
    Kagglehttp://kaggle.com/
    Authors
    DatasetEngineer
    License

    https://creativecommons.org/publicdomain/zero/1.0/https://creativecommons.org/publicdomain/zero/1.0/

    Description

    Dataset Title: Cybersecurity Threat Detection and Awareness Program Dataset (2018-2024)

    Description: This dataset provides a comprehensive collection of cybersecurity events and network traffic data, spanning from January 2018 to March 2024, collected from real-world corporate environments in Texas, USA. The data includes a diverse range of cybersecurity incidents, covering normal activity as well as various types of threats. It was gathered from multiple sources, such as network traffic logs, system logs, and external threat intelligence feeds, making it suitable for developing machine learning models aimed at threat detection, incident response, and cybersecurity awareness improvement.

    The dataset is well-suited for research and experimentation in threat intelligence, intrusion detection, cybersecurity awareness training, and anomaly detection. The included features allow for the modeling of various threat scenarios and multi-class classification tasks. The labeled data provides information on the severity and type of threats detected, supporting both supervised and unsupervised learning techniques.

    Features Overview:

    Date_Time: The timestamp of the event (e.g., 2022-05-01 14:30:00), indicating when the activity or incident occurred.

    Source_IP: IP address of the originating device involved in the event (e.g., 192.168.1.1).

    Destination_IP: IP address of the target device involved in the event (e.g., 10.0.0.5).

    Source_Port: Port number on the originating device (e.g., 443).

    Destination_Port: Port number on the target device (e.g., 80).

    Protocol_Type: The protocol used for the communication, such as TCP, UDP, ICMP.

    Flow_Duration: Duration of the network flow in milliseconds.

    Packet_Size: The size of the packet in bytes.

    Flow_Bytes/s: The number of bytes transmitted per second during the flow.

    Flow_Packets/s: The number of packets transmitted per second during the flow.

    Total_Forward_Packets: Total number of packets sent in the forward direction.

    Total_Backward_Packets: Total number of packets sent in the reverse direction.

    Packet_Length_Mean: Average packet length for the flow.

    IAT_Forward: Inter-arrival time for packets in the forward direction.

    IAT_Backward: Inter-arrival time for packets in the reverse direction.

    Active_Duration: Duration of active time for the connection.

    Idle_Duration: Duration of idle time for the connection.

    IDS_Alert_Count: Number of intrusion detection system alerts triggered during the event.

    Anomaly_Score: A score indicating the anomaly level of the event, derived from anomaly detection algorithms.

    Attack_Vector: Type of attack vector used (e.g., Phishing, DDoS, Brute Force).

    Attack_Severity: Severity of the detected threat, categorized as Low, Medium, High, or Critical.

    Compromised_Hosts_Count: Number of hosts compromised during the event.

    Botnet_Family: Family of botnet detected (if applicable), such as Mirai, Zeus.

    Malware_Type: Type of malware detected, such as Ransomware, Trojan.

    User_Login_Attempts: Number of login attempts during the event.

    Geolocation: Geographic location of the originating IP (Country, City).

    Device_Type: Type of device involved (e.g., Server, Router, Mobile).

    Firewall_Logs: Binary indicator (0 or 1) showing whether firewall logs flagged the activity.

    Antivirus_Alerts: Binary indicator (0 or 1) showing whether antivirus software detected a threat.

    Open_Ports_Count: Number of open ports on the target device.

    Reputation_Score: A score indicating the reputation of the IP/domain based on threat intelligence sources.

    Blacklisted_IP: Binary indicator (0 or 1) indicating if the IP is listed on a blacklist.

    Known_Vulnerability: Binary indicator (0 or 1) showing if the target system has known vulnerabilities (based on CVE).

    Threat_Intelligence_Source: Source from which the threat intelligence information was gathered.

    System_Patch_Status: Indicates whether the system is patched (Up-to-date, Outdated).

    CPU_Utilization: CPU usage percentage during the event.

    Memory_Utilization: Memory usage percentage during the event.

    Employee_Training_Completion: Completion rate of cybersecurity awareness training for the employee involved.

    Phishing_Simulation_Success: Result of phishing simulation attempts (Success, Failure).

    Reported_Incidents: Number of cybersecurity incidents reported by the user.

    Incident_Response_Time: Time taken to respond to the incident in minutes.

    Label (Target Variable):

    Threat_Severity: The severity level of the threat, categorized as: 0: No Threat 1: Low-Level Threat 2: Medium-Level Threat 3: High-Level Threat 4: Critical Threat Usage: This dataset is ideal for training and testing machine learning models for tasks such as:

    Multi-class classification for threat detection. Anomaly detection. Predictive modeling for incident response prioritization. Cybersecurity awareness program improvement. Researchers and...

  15. D

    Cyber Security Market Report | Global Forecast From 2025 To 2033

    • dataintelo.com
    csv, pdf, pptx
    Updated Jan 7, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataintelo (2025). Cyber Security Market Report | Global Forecast From 2025 To 2033 [Dataset]. https://dataintelo.com/report/global-cyber-security-market
    Explore at:
    csv, pptx, pdfAvailable download formats
    Dataset updated
    Jan 7, 2025
    Authors
    Dataintelo
    License

    https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy

    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Cyber Security Market Outlook



    The global Cyber Security market size was valued at approximately USD 202 billion in 2023 and is expected to reach a staggering USD 424 billion by 2032, with a compound annual growth rate (CAGR) of approximately 8.6% from 2024 to 2032. This remarkable growth trajectory is primarily driven by the increasing digitization across sectors, which has led to a surge in cyber threats, thereby necessitating robust cyber security measures. The rapid increase in sophisticated cyber attacks, combined with the advent of new technologies like IoT and cloud computing, has put tremendous pressure on organizations to enhance their security infrastructure, thus propelling the market growth.



    One of the significant growth factors for the cyber security market is the increasing adoption of cloud-based solutions. As more businesses move towards cloud computing for its scalability and cost-effectiveness, the need for advanced security solutions becomes paramount. Cloud security has emerged as a critical requirement to protect sensitive data from breaches and unauthorized access. Additionally, the rise in the number of connected devices through IoT has expanded the attack surface, compelling organizations to invest in advanced security solutions. Furthermore, governments and regulatory bodies worldwide are implementing stringent regulations and data protection laws, driving organizations to comply and invest in comprehensive cyber security measures.



    Another crucial factor contributing to the market's growth is the rising awareness of the potential financial and reputational damage caused by cyber breaches. Companies are increasingly recognizing the importance of safeguarding their digital assets and customer data. This awareness has led to increased expenditure on cyber security solutions and services, as businesses seek to build a more resilient IT infrastructure. Moreover, advancements in technologies such as artificial intelligence (AI) and machine learning (ML) are fostering the development of sophisticated security solutions capable of predicting and mitigating cyber threats in real-time, further fueling market expansion.



    Technological advancements and innovations in the field of cyber security, including the development of next-generation firewalls, intrusion detection systems, and advanced threat intelligence solutions, are also playing a vital role in driving the market forward. With the increasing complexity of cyber-attacks, traditional security measures are no longer sufficient. Organizations are looking for innovative solutions that can offer a multi-layered defense mechanism. Furthermore, the integration of blockchain technology in cyber security is gaining traction, providing a secure and transparent way to safeguard data, which is likely to contribute to market growth in the coming years.



    In the realm of Enterprise Cyber Security, organizations are increasingly prioritizing the protection of their digital assets and sensitive information. As businesses expand their digital footprints, the complexity and scale of cyber threats have grown exponentially. This has led enterprises to adopt a multi-layered security approach, integrating advanced technologies such as AI and machine learning to detect and respond to threats in real-time. Furthermore, enterprises are investing in comprehensive security frameworks that encompass network security, endpoint protection, and data encryption to safeguard their operations. The focus on enterprise cyber security is not only about preventing breaches but also about ensuring business continuity and maintaining customer trust in an increasingly interconnected world.



    Regionally, North America currently holds the largest share of the cyber security market, driven by the presence of a large number of key players and the early adoption of advanced technologies. However, the Asia Pacific region is expected to witness the highest growth rate during the forecast period. The rapid digital transformation, coupled with increasing cyber threats in countries like India and China, is driving the demand for robust security solutions in this region. Governments in the region are also actively investing in cyber security infrastructure, further propelling market growth. Europe is also a significant market for cyber security solutions, with stringent data protection regulations like GDPR pushing organizations to enhance their security measures.



    Component Analysis



    The cyber security market can b

  16. u

    Data from: The VNF cybersecurity dataset for research (VNFCYBERDATA)

    • drum.um.edu.mt
    bin
    Updated Nov 11, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    BELIEVE SEGUN AYODELE; VICTOR BUTTIGIEG (2024). The VNF cybersecurity dataset for research (VNFCYBERDATA) [Dataset]. http://doi.org/10.60809/drum.24998543.v1
    Explore at:
    binAvailable download formats
    Dataset updated
    Nov 11, 2024
    Dataset provided by
    University of Malta
    Authors
    BELIEVE SEGUN AYODELE; VICTOR BUTTIGIEG
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Virtualisation has received widespread adoption and deployment across a wide range of enterprises and industries throughout the years. Network Function Virtualisation (NFV) is a technical concept that presents a method for dynamically delivering virtualised network functions as virtualised or software components. Virtualised Network Function (VNF) has distinct advantages, but it also faces serious security challenges. Cyberattacks such as Denial of Service (DoS), malware/rootkit injection, port scanning, and so on can target VNF appliances just like any other network infrastructure. To create exceptional training exercises for machine or deep learning (ML/DL) models to combat cyberattacks in VNF, a suitable dataset (VNFCYBERDATA) exhibiting an actual reflection, or one that is reasonably close to an actual reflection, of the problem that the ML/DL model could address is required. This article describes a real VNF dataset that contains over seven million data points and twenty-five cyberattacks generated from five VNF appliances. To facilitate a realistic examination of VNF traffic, the dataset includes both benign and malicious traffic.CitationIf you are using this dataset for your research, please reference it as"Ayodele, B.; Buttigieg, V. The VNF Cybersecurity Dataset for Research (VNFCYBERDATA). Data 2024, 9, 132. https://doi.org/10.3390/data9110132"DocumentationDataset documentation is available at: https://www.mdpi.com/2306-5729/9/11/132

  17. CISA TTP Articles Data Set

    • zenodo.org
    csv, json
    Updated May 11, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dženan Hamzić; Dženan Hamzić; Florian Skopik; Florian Skopik; Markus Wurzenberger; Markus Wurzenberger; Max Landauer; Max Landauer (2025). CISA TTP Articles Data Set [Dataset]. http://doi.org/10.5281/zenodo.14659512
    Explore at:
    json, csvAvailable download formats
    Dataset updated
    May 11, 2025
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Dženan Hamzić; Dženan Hamzić; Florian Skopik; Florian Skopik; Markus Wurzenberger; Markus Wurzenberger; Max Landauer; Max Landauer
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Time period covered
    Sep 27, 2024
    Description

    This dataset contains 77 cybersecurity articles crawled from the public CISA website. All these articles were publically available at the time of crawling without the need of any subscription or usage of paid services. These articles were published from July 2020 to February 2024 and selected for this dataset if they contained explicitely mentioned MITRE ATT&CK TTPs (Tactics, Techniques, and Procedures).

    The data set supports research in the domain of Cyber Threat Intelligence as it may act as a ground truth for TTP labeling. Specifically, this dataset is designed to facilitate research and analysis related to the identification and classification of TTPs in cybersecurity advisories.

    Each crawled article is represented by the following four columns:

    • RawText: The unfiltered text extracted from the main content of each article (class: "l-full_main").
    • TTP: A set of MITRE ATT&CK TTP (Tactics, Techniques, and Procedures) IDs identified within the article's RawText. These IDs are extracted using the regex pattern: (?:TA\d{4}|T\d{4,5}(?:\.\d{3})?).
    • CleanText: A cleaned version of the RawText, with tables and TTP IDs removed for clarity.
    • URL: The url to the original article.

    About the crawling process

    All advisories were gathered on Sept 27th, 2024 from the CISA website by sifting through all advisory urls backwards in time until 2020. All articles which explicitely mentioned TTPs were selected for the data set. To detect the presence of TTP IDs, each article was checked for the presence of any of the following phrases in the main content:

    • "MITRE ATT&CK Tactics and Techniques"
    • "Tactics and Techniques"
    • "MITRE ATT&CK Techniques"

    The data set is availble in CSV and as JSON format, both containing the same data.

    Acknowledgments: Funded by the European Union under the European Defence Fund (GA no. 101121403 - NEWSROOM and GA no. 101121418 - EUCINF). Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or the European Commission. Neither the European Union nor the granting authority can be held responsible for them. This work is co-funded by the Austrian FFG Kiras project ASOC (GA no. FO999905301).

  18. U.S. number of cyberattacks leading to data exposure 2020-2024, by type

    • statista.com
    Updated Jul 7, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). U.S. number of cyberattacks leading to data exposure 2020-2024, by type [Dataset]. https://www.statista.com/statistics/1367217/us-annual-number-of-cyber-attacks-leading-data-compromises-by-type/
    Explore at:
    Dataset updated
    Jul 7, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    Phishing, ransomware, and business malware have been the most widespread types of cyberattacks in the United States, resulting in data compromises. In 2024, 455 cases of phishing and its variations were detected. Ransomware followed in the second place, with 188 attacks.

  19. Share of cyberattacks in Italy 2024, by reason

    • statista.com
    • ai-chatbox.pro
    Updated Jul 11, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Share of cyberattacks in Italy 2024, by reason [Dataset]. https://www.statista.com/statistics/649358/share-cyber-attacks-in-italy-by-reason/
    Explore at:
    Dataset updated
    Jul 11, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Italy
    Description

    During the first half of 2024, around ** percent of cyberattacks carried out in Italy had cybercrime as a purpose. Cyber espionage was another motivation, representing the main reason behind roughly **** percent of attacks. By contrast, information warfare only accounted for *** percent of the cyberattacks in the country in the last examined period. Data breaches in Italy In 2023, over half of the Italian digital population was alerted that their personal data had been breached, and **** percent of the alerted users had the misfortune of being affected by data compromise on the dark web. Despite a decrease in the number of data sets affected in data breaches between 2020 and 2023, Italy recorded almost *** million exposed data sets at the beginning of 2023.Meanwhile, the average cost of data breaches for both Italian companies and targeted users kept growing, reaching **** million U.S. dollars in 2024, up from the **** million U.S. dollars recorded in the previous year. The Italian privacy landscape: GDPR effects As a state member of the European Union, Italy is covered by the General Data Protection Regulation (GDPR). Since 2018, the GDPR has regulated online data privacy and has the responsibility to represent consumers’ interests within the digital and tech landscape of the Union. As of 2023, approximately *** fines were issued in Italy due to violations of the GDPR – making Italy the second country in Europe with the highest number of violations dispensed to tech companies. The highest GDPR fine ever issued in Italy was at the expense of Telecom Italia (TIM), one of the largest Italian telecommunications companies. TIM was fined approximately **** million euros in January 2020. GDPR is enforced and helped by the country's Garante della Privacy, the national institution overseeing Italian users’ online rights, cybersecurity, and digital privacy.

  20. Number of cybersecurity professionals worldwide 2024, by region

    • statista.com
    • ai-chatbox.pro
    Updated Jun 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of cybersecurity professionals worldwide 2024, by region [Dataset]. https://www.statista.com/statistics/1172449/worldwide-cybersecurity-workforce/
    Explore at:
    Dataset updated
    Jun 26, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2024
    Area covered
    Worldwide
    Description

    The number of professionals working in the cybersecurity industry was estimated to be over *** million in Europe in 2024. The number of cybersecurity professionals globally stood at **** million that year. Cybersecurity protects computer information systems, hardware, networks, and data from cyberattacks. As awareness of cyber threats is rising, so is the size of the global cybersecurity market. The cybersecurity workforce is growing fast, but demand is growing faster Cybersecurity workers have become some of the most in-demand members of today’s labor force with some specific roles being particularly difficult to fill, such as cloud security, security operations, or network security experts. In 2023, China was the country with the largest cybersecurity workforce gap, with a shortage of just over *** million cybersecurity professionals. The wider context of tech layoffs The struggle faced by employers worldwide to recruit qualified and skilled professionals to fill cybersecurity roles runs counter to the recent mass layoffs in the technology sector. Although COVID-19 restrictions, which triggered the layoffs in 2020, loosened up in 2021, factors such as the Russia-Ukraine war, rising inflation, and concerns about an economic recession continue to have a significant impact on the tech industry.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). Global biggest cybersecurity threats in the following year per CISOs 2024 [Dataset]. https://www.statista.com/statistics/1350460/cybersecurity-threats-at-companies-worldwide-cisos/
Organization logo

Global biggest cybersecurity threats in the following year per CISOs 2024

Explore at:
Dataset updated
Jun 23, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Time period covered
Jan 20, 2024 - Feb 2, 2024
Area covered
Worldwide
Description

According to a 2024 survey of Chief Information Security Officers (CISO) worldwide, Ransomware attacks were a leading cybersecurity risk, with roughly ** percent naming it as one of the three major cybersecurity threats. A further share of ** percent of the respondents found malware to be a significant risk to their organizations' cybersecurity. Email fraud compromise and DDoS attacks followed closely, with ** percent.

Search
Clear search
Close search
Google apps
Main menu