Partnerships that companies need for successful digital transformation

Palo Alto's 2025 State of GenAI report provides an in-depth look into how enterprises are adopting GenAI and where they remain most vulnerable

Generative AI security risks, GenAI adoption in India, Palo Alto 2025 GenAI report, AI-powered cyber threats, Shadow AI risks, AI jailbreak vulnerabilities, data loss prevention GenAI, Zero Trust security architecture, enterprise AI governance, GenAI
Globally, technology and manufacturing sectors alone account for 39% of AI coding transactions, creating additional risk for industries that depend on proprietary IPs
Shivani Shinde
2 min read Last Updated : Jul 06 2025 | 11:12 PM IST
While artificial intelligence (AI) growth offers better productivity benefits, a recent report warns that unsanctioned usage, emerging threats, and a lack of governance have rapidly expanded the attack surface for organisations, particularly across India and the Asia-Pacific region. Palo Alto’s 2025 State of GenAI report, based on traffic analysis from 7,051 global enterprise customers, provides an in-depth look into how enterprises are adopting GenAI and where they remain most vulnerable.
 
Best practice recommendations 
  • Gain comprehensive oversight of GenAI app usage, implement conditional access policies, and manage permissions at the user and group level
  • Deploy real-time content inspection with centralised policy enforcement to detect and prevent unauthorised data exfiltration
  • Implement Zero Trust security architectures to mitigate modern cyberthreats, malware, and sophisticated AI-powered attacks
 
Key findings of the 2025 GenAI Security Report include
 
  • Rapid adoption rates: 890% surge in Generative AI (GenAI) traffic in 2024. 
  • India’s top 3 most used GenAI apps by volume: Grammarly (32.56%), Microsoft Power Apps (19.98%), and Microsoft Copilot (16.37%)
  • Risk posture: Globally, on average, 10% of a company’s 66 GenAI apps high-risk
  • Rising data loss incidents: GenAI-related data loss prevention (DLP) incidents more than doubled through the course of 2025, now accounting for 14% of all data security incidents.
  • Shadow AI emerges as a key risk: Unauthorised, unsanctioned GenAI use, termed “Shadow AI”, has created blind spots for IT and security teams, making it difficult to control sensitive data flows.
  • Jailbreaking remains a top concern: Many high-risk AI models susceptible to jailbreak attacks that produce unsafe content, including offensive material and instructions for illegal activities.
  • Industry-specific insights: Globally, technology and manufacturing sectors alone account for 39% of AI coding transactions, creating additional risk for industries that depend on proprietary IPs.
 
Source: Palo Alto’s 2025 State of GenAI report

One subscription. Two world-class reads.

Already subscribed? Log in

Subscribe to read the full story →
*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

Topics :Artificial intelligenceCyber fraudTechnology

Next Story