agentic AI.
We've curated 9942 cybersecurity statistics about Agentic AI to help you understand how autonomous AI systems are revolutionizing threat detection and response in 2025, enhancing security practices while also introducing new risks to navigate.
Showing 21-40 of 9942 results
81% of CISOs and AppSec executives are willing to pivot to new MCP protection tools.
55% of CISOs and AppSec executives are willing to replace RASP.
52% of CISOs and AppSec executives are willing to replace SCA.
49% of CISOs and AppSec executives are willing to replace SAST/DAST.
13% of CISOs and AppSec executives use agent-based deployment.
87% of CISOs and AppSec executives prefer agentless, package-based, or simple CI/CD-based deployment.
68% of ASPM platform users struggle to prove posture and risk to leadership or auditors.
67% of ASPM platform users cite data gaps and missing telemetry that create blind spots.
Over 75% of security professionals do not have the real-time production insight necessary to validate risk and understand how their code behaves in real-world environments.
72% of SAST/DAST users are challenged by an overwhelming number of false positives.
44% of attacks in the Automotive and Smart Mobility ecosystem are ransomware-related, more than double the volume in 2024.
67% of incidents in the Automotive and Smart Mobility involve telematics and cloud systems as attack vectors.
68% of incidents in the Automotive and Smart Mobility involve data and privacy breaches.
61% of incidents in the Automotive and Smart Mobility have the potential to impact thousands to millions of mobility assets.
92% of automotive cyber attacks are conducted remotely, of which 86% require no physical proximity to vehicles and systems.
1% of enterprises have a dedicated AI security budget.
21% of enterprises plan to introduce a dedicated AI security budget.
50% of CISOs cite lack of internal expertise as a top AI security challenge.
36% of CISOs report insufficient AI-specific security tools as a top challenge.
58% of CISOs say AI is influencing their security stack consolidation strategy.