Subscribe

Thomas Stoesser l Dec 11, 2025 l TAMUNIO, Data Security Platform

Looking Back at a Year of Mounting Risk but New Opportunities

It’s been another 12 months of high drama and escalating threats. For cybersecurity leaders managing risk in some of the world’s largest and most complex IT environments, the pressure from regulators, threat actors and the business continues to grow inexorably. In the US alone, organizations were forced to send out over 165 million breach notifications in the first half of the year, putting 2025 on track to become the worst year on record for data compromises.

However, there is light at the end of the tunnel. Against this concerning backdrop, comforte had some good news for global enterprises. Introduced a few weeks ago, the new TAMUNIO platform will help customers meet compliance mandates, protect complex, distributed IT environments, and support business demands for sustainable growth.

Looking back, looking ahead

Several trends stand out from the past 12 months:

The compliance burden grows

Corporate compliance teams had plenty to keep them busy this year. First came the deadline for the Digital Operational Resilience Act (DORA), which introduces strict new risk management requirements for financial services firms and their IT partners operating in the EU. Then PCI DSS 4.0, which includes new mandates for multifactor authentication (MFA), encryption and key management, among other things. The shadow of NIS2 also continued to fall over organizations with EU customers—it too requires new baseline security requirements like strong encryption. And in the US, new data protection laws came into force in Iowa, Delaware, Nebraska, New Hampshire, New Jersey, Tennessee, Minnesota, and Maryland.

For organizations operating in multiple jurisdictions, compliance got way more complicated in 2025. And with big fines waiting for erring companies, the stakes couldn’t be higher.

Cyber threats mount

Global enterprises were also faced with a fast-evolving threat landscape this year. An infostealer epidemic flooded the cybercrime underground with compromised credentials — simplifying intrusions, data breaches and ransomware attacks. Insider threats continued to surge, with state-backed spies gaining employment in some firms. And threat actors began to harness the power of AI tools in earnest to improve social engineering, vulnerability exploitation and research, victim reconnaissance and exfiltration. There are even suggestions that agentic tools are being used to automate and orchestrate multiple stages of the attack kill chain.

All of which helps explains why Verizon this year recorded a sizeable increase in system intrusions, ransomware, vulnerability exploitation and supply chain breaches. There were also reports that threat actors are launching harvest now, decrypt later (HNDL) attacks with one eye on the eventual development of cryptographically relevant quantum computers (CRQCs).

Business double down on digital

Amid this chaos, organizations responded to growing business, trade and geopolitical uncertainty by investing in cloud, AI and other digital projects. This unwittingly created new opportunities for threat actors as the attack surface expands faster than defensive measures can be deployed. It didn’t help that security budgets were under pressure, cyber skills remained in short supply, and point solutions left gaping security gaps.

The rapid adoption of AI also created specific new vulnerabilities for organizations — notably unmanaged use of tools which could increase compliance and security risk. Put simply, if organizations don’t know where all their data is, they can’t secure it.

Many businesses also struggled to reconcile their desire for AI-powered growth with existing security controls and frameworks, which don’t allow sensitive data to be used in analytics tools. And they realized that legacy key management mechanisms are a poor fit for modern data security practices — exposing them to extra cost and complexity, and delaying digital transformation initiatives.

Changing the Game with TAMUNIO

Fortunately, comforte had some good news for under pressure IT security and compliance leaders in 2025, with the launch of TAMUNIO. The platform unifies powerful data discovery, protection and secure use across on-premises and multi, hybrid cloud environments. Centralizing everything in this way minimizes security/compliance complexity and reduces breach costs for customers, while empowering them to unlock the value of their data in AI and analytics tools.

Among the most powerful capabilities are:

Unified Platform Experience: Consolidates siloed tools into simple packages (Protect, Govern, Transit, Core, Transform, Access).

Confidential Compute & Sovereignty Zones: Process sensitive plaintext data in secure, customer-controlled environments.

AI-Powered Data Discovery: Automatically and continuously detects sensitive data across structured and unstructured sources.

Quantum-Safe Encryption: Protects data against CRQCs and HNDL attacks and secures today’s operations.

Centralized Monitoring & Key Management: Reduces complexity compliance cost and security gaps across hybrid IT environments.

Unified Monitoring & Auditing: Consolidated logging for HPE NonStop, cloud and open systems centralizes compliance reporting.

Unstructured Data & File Protection: Expands protection to mitigate breach risks across all sensitive enterprise data.

Support for AI-driven Growth: AI models can be run in isolated Sovereignty Zones to protect underlying data. And data can be pseudonymized before it’s inputted into third-party AI models, to preserve context but eliminate leakage risks.

This is about more than merely reducing breach risk. TAMUNIO translates into genuine business benefits: reduced friction, improved supply chain confidence, market expansion, digital transformation and increased customer loyalty.

For security leaders concerned about what 2026 might have in store, TAMUNIO can be a reliable bulwark against enterprise risk.


Share this:  LinkedIn Bluesky XING Email

TAMUNIO Data Security Platform

Discover how TAMUNIO unifies data discovery, protection, and governance across HPE Nonstop, cloud, and open systems, helping enterprise teams secure sensitive data, reduce complexity, and enable analytics and AI safely under a single consistent operating model.

TAMUNIO Data Security Platform

Related posts